Behavioral task
behavioral1
Sample
22010c5606003f8a6d4a032e4e38bd44.xls
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
22010c5606003f8a6d4a032e4e38bd44.xls
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
22010c5606003f8a6d4a032e4e38bd44
-
Size
648KB
-
MD5
22010c5606003f8a6d4a032e4e38bd44
-
SHA1
e2db8346ef1639d380181acee780e119b961c2a4
-
SHA256
5c719023c08e67a9bbaceae87d4b04e73a5224f1b1db35826fcf3966219041bf
-
SHA512
0a1cb8637f420d981ebc024056f28ebe2cf7ee762ac807055dc76a0019e2967a5da3e96c922df91f334c7bcb5a626a04deb29de350498dd7d96c8a9c6696e080
-
SSDEEP
12288:5ZV+AeCxuQGh0MTehUGaPOVZoRKN1tZjIbt31Vy3Np7ug2EFfRq:5v+QxZGh+uGb1vjIBr6Np7uXCpq
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
22010c5606003f8a6d4a032e4e38bd44.xls windows office2003