Behavioral task
behavioral1
Sample
dc3b3caf253eb2e119a5dbe1917a1190N.xls
Resource
win7-20240903-en
5 signatures
120 seconds
Behavioral task
behavioral2
Sample
dc3b3caf253eb2e119a5dbe1917a1190N.xls
Resource
win10v2004-20240802-en
5 signatures
120 seconds
General
-
Target
dc3b3caf253eb2e119a5dbe1917a1190N.xls
-
Size
221KB
-
MD5
dc3b3caf253eb2e119a5dbe1917a1190
-
SHA1
e2cf778fc9f92653f57d99043429a6c7d82cbc6f
-
SHA256
342a9de4368e9fba5895781caca0e66a48f33b9ae9ed3d8526483a24aed5cb8b
-
SHA512
b1883ac97a2f972f8c91f1593ab440dd4143e4ca9edca212261c7eba5ae83dad835b48b6b7793a4249c6b77f0c775c7e088f09cc0b83a3ae594feefe7b0117fd
-
SSDEEP
3072:cP42li7Ln0aWhhw245p9ktIwFj9wXvaoKrGG1k67S5sS:WunlWhB4jJTeXS
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
dc3b3caf253eb2e119a5dbe1917a1190N.xls.xls windows office2003