Behavioral task
behavioral1
Sample
920ecae2dddc3861e17ed4adfa7f81b453f9b10ce55395177f391a6123d13fd4.xls
Resource
win7-20241010-en
12 signatures
150 seconds
General
-
Target
920ecae2dddc3861e17ed4adfa7f81b453f9b10ce55395177f391a6123d13fd4
-
Size
88KB
-
MD5
854ac80c7d0577e496cfe1d0b22bc8f7
-
SHA1
eb7f7fa51a92e005ce0692bc7986d98e8d96ea63
-
SHA256
920ecae2dddc3861e17ed4adfa7f81b453f9b10ce55395177f391a6123d13fd4
-
SHA512
c419084a1d61d4beea2ae4eb9d1afb979a97f88d020fd8a4a73439b0c3a7a4ff403fe933c07b6b05b441a563b4dd51ce2c12c93080c2ce8a554f77953f67d578
-
SSDEEP
1536:syehv7q2Pjx45uoDGTj+5xtekEvi8/dgL8EsAeE9jbDXQAzkWvgrPE4nWHPNc2AF:syehv7q2Pjx45uoDGTj+5xtekEvi8/db
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
920ecae2dddc3861e17ed4adfa7f81b453f9b10ce55395177f391a6123d13fd4.xls windows office2003
AdsGSryh6ifgbv
gjTiSdFHse4sdc
DFGrtHsr6uidfss
sd57e45yderfg