Behavioral task
behavioral1
Sample
694a89c43d506d56ce3cece6cf772c02.xls
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
694a89c43d506d56ce3cece6cf772c02.xls
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
694a89c43d506d56ce3cece6cf772c02
-
Size
793KB
-
MD5
694a89c43d506d56ce3cece6cf772c02
-
SHA1
a0624d42ea889e4acc95795b5f00c4b053f2212c
-
SHA256
07bc756e9f681b733754ccf7a3981e454be5e0a01da030e08aa039c2f4c18426
-
SHA512
7fa30702bb301d0a183761438ba9a0e912c81d9836957c256faa1a73b29ba16200d26c12bf0cfccecf93b631b3cc270bff5654c57413f01a2881e5296345a974
-
SSDEEP
12288:mu9cPexsYepFX4Pv1maGm529gEZpNm1fMzS06V07+1JU1U:8YebsmG5sgEo1EOeDO
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
694a89c43d506d56ce3cece6cf772c02.xls windows office2003