Behavioral task
behavioral1
Sample
f25f3770c942e387de418ecc50dd1ac49c713406c77d833d21f3603b54290750.xls
Resource
win7-20241023-en
14 signatures
60 seconds
General
-
Target
f25f3770c942e387de418ecc50dd1ac49c713406c77d833d21f3603b54290750
-
Size
46KB
-
MD5
85805d0582f2ba6089e4fa5f1f15cc3e
-
SHA1
d39dbac127be08bfc857a6891eaa80fb6ef7d226
-
SHA256
f25f3770c942e387de418ecc50dd1ac49c713406c77d833d21f3603b54290750
-
SHA512
5145d6facb073f80d649f7fb316d4d72df04d0977f3fa026a4ba30023006b59055f1f966330b5dec87be9052059f98e8dedd9a072f2a5b596c1b446543426d08
-
SSDEEP
768:q4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:JSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f25f3770c942e387de418ecc50dd1ac49c713406c77d833d21f3603b54290750.xls windows office2003