Behavioral task
behavioral1
Sample
8f4771f2a0b72968a3666f387f711273a8bee48da27a2f9f66127a9f6cf53b04.xls
Resource
win10v2004-20230621-en
5 signatures
150 seconds
General
-
Target
8f4771f2a0b72968a3666f387f711273a8bee48da27a2f9f66127a9f6cf53b04.xls
-
Size
1.6MB
-
MD5
1f733e6973df4395a7dcabe51b411c6b
-
SHA1
9cb96959f39b230e59e6e442029983758425467a
-
SHA256
8f4771f2a0b72968a3666f387f711273a8bee48da27a2f9f66127a9f6cf53b04
-
SHA512
da14656949c3efe06ad54c89aec9f4dbf61baf7dae9eca299f1e8b7ddea368589a7f95875020f3b5714a43578504c53a38beebb9983fa6f43c9b767d484e2d0c
-
SSDEEP
24576:NECgCQEztPc3m/YWcTEQ6iCEQpcaQb6icUyfpyO6igQpcoiQpca1IY6i:KbCQMGh
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
8f4771f2a0b72968a3666f387f711273a8bee48da27a2f9f66127a9f6cf53b04.xls.xls windows office2003