Behavioral task
behavioral1
Sample
674908e5d298c31ec3f14a0c4b9ae03a.xls
Resource
win7-20240903-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
674908e5d298c31ec3f14a0c4b9ae03a.xls
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
674908e5d298c31ec3f14a0c4b9ae03a.xls
-
Size
660KB
-
MD5
674908e5d298c31ec3f14a0c4b9ae03a
-
SHA1
a952d25b63251248d338fe52077f90079518423b
-
SHA256
5ba39d55993234a526bb7219d3001cb05eae3f7607889ae38e68adeee271a177
-
SHA512
f51e624839a6501db849850a056fdcebc24af3e62b2dd3a0c1735927c85ae0601925e1a8b762c04678ff7af76943ef65ec087dadc194ff996c2b8aa9d6d79057
-
SSDEEP
12288:ofIQEkONm1fwD6C3BPFEWUVsj/pqvi0WXoaL:o3NF1fw6iQipqv6jL
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
674908e5d298c31ec3f14a0c4b9ae03a.xls.xls windows office2003