Behavioral task
behavioral1
Sample
74797e15e5b212239e3354233e722d56147440398c2d7eda8873d726c451da67.xls
Resource
win7-20240708-en
12 signatures
60 seconds
General
-
Target
74797e15e5b212239e3354233e722d56147440398c2d7eda8873d726c451da67
-
Size
438KB
-
MD5
0781e48bff4089188229288b5bbe428c
-
SHA1
fd8b8081e802444372dbb8722a5e9ce58ce20261
-
SHA256
74797e15e5b212239e3354233e722d56147440398c2d7eda8873d726c451da67
-
SHA512
b6d54f6f0dc284a0434beaf28c264ad4eff8228e8e32a9e745738e782cba39377b733111c15f16b20aa50a0c8b5c28c79b7529ad776ee4a875168fb91488266d
-
SSDEEP
12288:J947a/JjsLZjXYc7X0/aXCKli04OaZ1XSwbhF0:ZurYc7E/i004OSLbhF0
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
74797e15e5b212239e3354233e722d56147440398c2d7eda8873d726c451da67.xls windows office2003
DFdgfhdSG68ur
zasD346tjldff
jSgbhisudhfozis