Behavioral task
behavioral1
Sample
29c4b9dd411a6cbf5ac4c479aabcad90cdd8e1228509df7918920b7bf7d89527.xls
Resource
win7-20240903-en
windows7-x64
14 signatures
60 seconds
General
-
Target
29c4b9dd411a6cbf5ac4c479aabcad90cdd8e1228509df7918920b7bf7d89527
-
Size
46KB
-
MD5
20118dff69247ba2005af86a2d37c4a5
-
SHA1
a17d3a00fcbc2c7d88f9d351bc6a03efd3a3e867
-
SHA256
29c4b9dd411a6cbf5ac4c479aabcad90cdd8e1228509df7918920b7bf7d89527
-
SHA512
60763b30fbba621f581a2b470f40a7d6d45755e4c661c80d4b1fd845fc5441203c9e2bf51ff62bd7e6086d0650ccee72614b32b09ad14731f2b4626d182c49c8
-
SSDEEP
768:b4SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:sSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
29c4b9dd411a6cbf5ac4c479aabcad90cdd8e1228509df7918920b7bf7d89527.xls windows office2003