Behavioral task
behavioral1
Sample
ba1746e49a4557b56504c7ba3d6ddbcbc6a012484d50ad36bff18e41d9f9c0b5.xls
Resource
win7-20240708-en
12 signatures
60 seconds
General
-
Target
ba1746e49a4557b56504c7ba3d6ddbcbc6a012484d50ad36bff18e41d9f9c0b5
-
Size
438KB
-
MD5
4730e79a3698edbac2f06e439025303b
-
SHA1
f4a45310262b429dcdbc9e6b9d801cb682be2f3c
-
SHA256
ba1746e49a4557b56504c7ba3d6ddbcbc6a012484d50ad36bff18e41d9f9c0b5
-
SHA512
68ac3709b741627e0f2b407104cfb81f232cb901529fbb2e5b3a7dcbd068929d93667afc1eab6cc899fe5fc84b86dccdb7ffd3156d65cafbd6962d6d265c8537
-
SSDEEP
12288:c947a/JjsLZjXYc7X0/aXCKli04OaZ1X+Q7hFk:WurYc7E/i004OSH7hFk
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
ba1746e49a4557b56504c7ba3d6ddbcbc6a012484d50ad36bff18e41d9f9c0b5.xls windows office2003
DFdgfhdSG68ur
zasD346tjldff
jSgbhisudhfozis