Behavioral task
behavioral1
Sample
a0fa364ec90c54daa23aa7d3836208e9d8cd1ba77b7a4ca2eb6b1850a5cc2b36.xls
Resource
win11-20240508-en
12 signatures
300 seconds
General
-
Target
a0fa364ec90c54daa23aa7d3836208e9d8cd1ba77b7a4ca2eb6b1850a5cc2b36
-
Size
134KB
-
MD5
d300fd1bce0ef55d5f91e39f0c828ebd
-
SHA1
8357bde9428c289509ff734d17466968c2e9096a
-
SHA256
a0fa364ec90c54daa23aa7d3836208e9d8cd1ba77b7a4ca2eb6b1850a5cc2b36
-
SHA512
45987fcae5dd6ac839e3b5c6c2778556d8faafeb3e67ec1a37e0a7d9fafda305e30f34c79c53132569959c1ed4b1a0a6171684418495a915bf845dc6014d54ec
-
SSDEEP
3072:q4Q+A64l7VX1TnRrpXJ0eQm02RxHFk3hOdsylKlgryzc4bNhZFGzE+cL2knmXRfK:q4Q+A64l7VX1TnRrpXJ0eQm02RxHFk3F
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a0fa364ec90c54daa23aa7d3836208e9d8cd1ba77b7a4ca2eb6b1850a5cc2b36.xls windows office2003
ThisWorkbook
Sheet1
Module1