Behavioral task
behavioral1
Sample
f38ad97265f312101b15710f97bd2b72.xls
Resource
win7-20230220-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
f38ad97265f312101b15710f97bd2b72.xls
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
f38ad97265f312101b15710f97bd2b72.xls
-
Size
8.3MB
-
MD5
f38ad97265f312101b15710f97bd2b72
-
SHA1
716fa7033fb8e91ae67d181df06074c132b78672
-
SHA256
82c532dbbc2c2d43b993f06471a35d6d25bf8b95b1784fabac3b0f50f728d479
-
SHA512
4757ff1ff56bcbcbe01dcabb5a0fb817e04a54274860319d1162a86bfe85c1c9365cc4b1931176c79f8c7ca94343f48e70e7b63b4ac31d8d2cbec0b1e9e6ec14
-
SSDEEP
49152:kFepJPBVlYeshgqP8CJR4eecZisnqR9+gv1GfJQlCgOnbXD4nytjbYbgu0LcSASe:86JPBV2f8eIAHzY1MQBSXIytjEgIyYP
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f38ad97265f312101b15710f97bd2b72.xls