Behavioral task
behavioral1
Sample
24b4d9a5b97f3c5e3868994f514e8092.xls
Resource
win7-20231201-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
24b4d9a5b97f3c5e3868994f514e8092.xls
Resource
win10v2004-20231201-en
0 signatures
150 seconds
General
-
Target
24b4d9a5b97f3c5e3868994f514e8092
-
Size
129KB
-
MD5
24b4d9a5b97f3c5e3868994f514e8092
-
SHA1
e82267be7ddec14daa40ec3d08bd1f4e4cbb9eb9
-
SHA256
afa3e9f1e2e8ef35f6e723c140476d644698b01eef19742cefac117e640797a4
-
SHA512
4e745f73e079022d7eec08ee034e61976facf6cfa201b5099222f8b1c69c14b94870161f5668a03ad52c2e76b4a843573aa03c0083a5690253ab29e91bcd0ca3
-
SSDEEP
3072:Sk3hOdsylKlgxopeiBNhZFGzE+cL2kdAxc6YehWfGdtUHKGDbpmsii/+u6ssC06+:Sk3hOdsylKlgxopeiBNhZF+E+W2kdAxX
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
24b4d9a5b97f3c5e3868994f514e8092.xls windows office2003