Behavioral task
behavioral1
Sample
swift.xls
Resource
win7-20230712-en
2 signatures
150 seconds
General
-
Target
swift.xls
-
Size
224KB
-
MD5
dc59769d621464161f07036b3e5a7192
-
SHA1
6b2a05ebe463d765653d3d4882c3b724d1cc19c4
-
SHA256
f60c67f4a0a95edbecac6f39fdc6515b958fa11755046a1c0d6b36785bcb959f
-
SHA512
159f0f6850b8baada5f6397dec479061cfc9a8f69db3c003cb0405fa3848f9386425c668fc07cf6b090c2cab5a335a24b624fc55ef7fef517fe39798038fe3a5
-
SSDEEP
6144:JxEtjPOtioVjDGUU1qfDlavx+W2QnA6dLbYj6hSZkwdZ5256CAxB8o7Fj:sLsj6sZlZ56ax/
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
swift.xls.xls windows office2003
Module1
ThisWorkbook
Sheet1
Sheet2
Sheet3