Behavioral task
behavioral1
Sample
52f44039d97483f8ba440cc2f1745cbc4bb9663d27ef9ea40e2788e2813994ae.xls
Resource
win7-20240903-en
windows7-x64
8 signatures
60 seconds
General
-
Target
52f44039d97483f8ba440cc2f1745cbc4bb9663d27ef9ea40e2788e2813994ae
-
Size
192KB
-
MD5
8347418fb4da55c1e1afe281a84c6c4d
-
SHA1
426e1a5950a97345ac8ed1d11cb7aea1c90fedd2
-
SHA256
52f44039d97483f8ba440cc2f1745cbc4bb9663d27ef9ea40e2788e2813994ae
-
SHA512
9192ec1f65dad0faddca5eb0d3353cff66d60bb41a66a27d7afa5328550011e6139516e9850a2c5e1156126f145bdb915b0374e97ddf0def9784d7e8ec250b3d
-
SSDEEP
3072:MrxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAq3OLFyhxTchWwaZYwP+1oVET5K8lsq/:2xEtjPOtioVjDGUU1qfDlavx+W2QnAqE
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
52f44039d97483f8ba440cc2f1745cbc4bb9663d27ef9ea40e2788e2813994ae.xls windows office2003
Module1
ThisWorkbook
Sheet1
Sheet2
Sheet3