Behavioral task
behavioral1
Sample
6a902be79119d979286c45b81eeeb624.xls
Resource
win10v2004-20230703-en
9 signatures
1200 seconds
General
-
Target
6a902be79119d979286c45b81eeeb624.zip
-
Size
46KB
-
MD5
3cb7535d3db1504703b3cb6536dc1498
-
SHA1
e17b036f8d1958d9a7c0245f7bd118747092b8ca
-
SHA256
081b4c452039bc4c4aefe034f7ce0a57f982f651f2c94d6720cba07b68033f79
-
SHA512
b14096d9a494c298c14de28f866efb76625443b5a74853fac06e054e8af1f6a560ed87170ac200b79d6ced997f2f29cca7f869445050bfc9bbe1dfcaa228b5b8
-
SSDEEP
768:eJqR9GLC8yMsGkh54q0gGDRbh/QjZXpj7nDZ19jEwPBUxfBMg3MQvKcNeWJi:CqR7GokFN5AZZfnDZHLPsfag3MQCb
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/6a902be79119d979286c45b81eeeb624 office_macro_on_action -
resource static1/unpack001/6a902be79119d979286c45b81eeeb624
Files
-
6a902be79119d979286c45b81eeeb624.zip.zip
Password: infected
-
6a902be79119d979286c45b81eeeb624.xls windows office2003
ThisWorkbook
ModUtily
RunMacro
frmWait
Moddec