Behavioral task
behavioral1
Sample
702346eb0afef09975e7fef489c5709aab53b63218f395b3d88ec319ed5610bb.xls
Resource
win7-20240903-en
12 signatures
150 seconds
General
-
Target
702346eb0afef09975e7fef489c5709aab53b63218f395b3d88ec319ed5610bb
-
Size
88KB
-
MD5
a48c5fe65454c59e54ac3322b915cffd
-
SHA1
6113ddf000724662bb7a9ed3914ab97e35a6ce9e
-
SHA256
702346eb0afef09975e7fef489c5709aab53b63218f395b3d88ec319ed5610bb
-
SHA512
bbe81525d23a129857ae3ae72e01471c56521995981804c4067d5e42b0270454c4d8aa86df00471128cb26b6d60eff1ca42951727d31d781c95b0702fe872597
-
SSDEEP
1536:wyehv7q2Pjx45uoDGTj+5xtekEvi8/dg38EsAeE9jbDXQqBkWvgrPE4nWHPNc2AR:wyehv7q2Pjx45uoDGTj+5xtekEvi8/d3
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
702346eb0afef09975e7fef489c5709aab53b63218f395b3d88ec319ed5610bb.xls windows office2003
AdsGSryh6ifgbv
gjTiSdFHse4sdc
DFGrtHsr6uidfss
sd57e45yderfg