Behavioral task
behavioral1
Sample
41e539903a92b4fe938d7129fe36d6430eec45de74498889ce9672200cf2a82d.xls
Resource
win7-20240903-en
12 signatures
60 seconds
General
-
Target
41e539903a92b4fe938d7129fe36d6430eec45de74498889ce9672200cf2a82d
-
Size
438KB
-
MD5
58cd09a0cc6958ecfe77fe5c6f6feb81
-
SHA1
d6443a069ea6c1f6d21dbaf700c329cb12aef2d6
-
SHA256
41e539903a92b4fe938d7129fe36d6430eec45de74498889ce9672200cf2a82d
-
SHA512
62c3b55771518a530dc00dcc987d5ae2aa231281323e565c97f4c3763672c0dffd88dbc165e2c65bf972950377dbd18808515d867e40d39fa2077807d1526559
-
SSDEEP
12288:f947a/JjsLZjXYc7X0/aXCKli04OaZ1X+Q7hFk:burYc7E/i004OSH7hFk
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
41e539903a92b4fe938d7129fe36d6430eec45de74498889ce9672200cf2a82d.xls windows office2003
DFdgfhdSG68ur
zasD346tjldff
jSgbhisudhfozis