Behavioral task
behavioral1
Sample
302e985ae78c7fd3aec6eb243c0e4846.xls
Resource
win10v2004-20250314-en
5 signatures
150 seconds
General
-
Target
da186466716d33f87c970477b56ac13303ac5e47d023f27470e7255f0f15b37f
-
Size
47KB
-
MD5
81095bb341d337d08de7a3b47d6ef2ee
-
SHA1
8a5d0c3ae4bd051ca67f6d65fc9767aa7421b836
-
SHA256
da186466716d33f87c970477b56ac13303ac5e47d023f27470e7255f0f15b37f
-
SHA512
b1fb619897f884244ff80ba4c9e7997dd216f26b1a560cbb0817805f18fd69973d8df14d0b44fa70039f9500faddd664259944ca84998fe398d55263f9978ca7
-
SSDEEP
768:rWFYZcTGJXibpPpcazCS70wLE1WfgA+Wpc1VYqqkJmahVI+oURe+Pvrzlk6nRpNI:r/xJapP6azHVLEAfgVWpc1iq1rEQrHWZ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/302e985ae78c7fd3aec6eb243c0e4846 office_macro_on_action
Files
-
da186466716d33f87c970477b56ac13303ac5e47d023f27470e7255f0f15b37f.zip
-
302e985ae78c7fd3aec6eb243c0e4846.xls windows office2003