Behavioral task
behavioral1
Sample
cd85c2fdcd8ca960bf77247d2707d8c982bb0a0f8d1390eca8e74064b01c7f60.xls
Resource
win7-20240708-en
windows7-x64
14 signatures
60 seconds
General
-
Target
cd85c2fdcd8ca960bf77247d2707d8c982bb0a0f8d1390eca8e74064b01c7f60
-
Size
46KB
-
MD5
cdacbcc06043403546aee2076b84a864
-
SHA1
0419744d77b7216c780b3ef2782c7c45280b5d8e
-
SHA256
cd85c2fdcd8ca960bf77247d2707d8c982bb0a0f8d1390eca8e74064b01c7f60
-
SHA512
07c6eceac262cd2f226f370d7a17fb0e5a25b2b790502f5adc39fd57547c02b1cf8796ca6de199425025882e77a58bc5672b4163606a74706e905ba44206db08
-
SSDEEP
768:54SFsv66g3KnF439NKC54kkGfn+cL2XdA8YRtukODXwXqt7sNAQYzKEm8ZRu9Uzp:mSFsv66g3KnF439NKC54kkGfn+cL2Xd+
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
cd85c2fdcd8ca960bf77247d2707d8c982bb0a0f8d1390eca8e74064b01c7f60.xls windows office2003