Behavioral task
behavioral1
Sample
957d3fe2fd3c0919cdff42a3fedf3ae3baf6d556b3e0dab7463274aaa4ab5166.xls
Resource
win7-20240708-en
12 signatures
60 seconds
General
-
Target
957d3fe2fd3c0919cdff42a3fedf3ae3baf6d556b3e0dab7463274aaa4ab5166
-
Size
438KB
-
MD5
03d9e316ad1921ab34b1a50716801070
-
SHA1
c57cb802f00d64930844e3e46208bc60f61bc903
-
SHA256
957d3fe2fd3c0919cdff42a3fedf3ae3baf6d556b3e0dab7463274aaa4ab5166
-
SHA512
ec70a766bad0c34aad5eb38b37afa4121deff424d4c12a456a784262bd611498c9e556f0014816ad4ae3f15e34380548b342efed79a40cd1a48fdffdae8fe59f
-
SSDEEP
12288:/947a/JjsLZjXYc7X0/aXCKli04OaZ1XyAzhFA:7urYc7E/i004OS7zhFA
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
957d3fe2fd3c0919cdff42a3fedf3ae3baf6d556b3e0dab7463274aaa4ab5166.xls windows office2003
DFdgfhdSG68ur
zasD346tjldff
jSgbhisudhfozis