Static task
static1
Behavioral task
behavioral1
Sample
a04f4de848a5b5ef49f1bd832d1075a1ec4ef79c1e4d4bb6bf09440ab35cc409.doc
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
a04f4de848a5b5ef49f1bd832d1075a1ec4ef79c1e4d4bb6bf09440ab35cc409
-
Size
82KB
-
MD5
927f4030acef0cff79aa8b1766906708
-
SHA1
f26884a3fb2d7bff8e0e8b6c289d5d7b3d1e26e9
-
SHA256
a04f4de848a5b5ef49f1bd832d1075a1ec4ef79c1e4d4bb6bf09440ab35cc409
-
SHA512
de1b423d0dbc10172d8e9229fafd4e3011e056aaecf5b12b440250b256fb8cba960265d0f5aaa705e6dd8c5a01be3d60c8928d9d536c12f2c2454f3eaf6a431b
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource yara_rule sample office_xlm_macros
Files
-
a04f4de848a5b5ef49f1bd832d1075a1ec4ef79c1e4d4bb6bf09440ab35cc409.doc windows office2003
aDjEsPp