Static task
static1
Behavioral task
behavioral1
Sample
8e04c42475bc3540925710dd1c71fad658b7cb19b6b2206fb59d0fea9b37cd2a.doc
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
8e04c42475bc3540925710dd1c71fad658b7cb19b6b2206fb59d0fea9b37cd2a
-
Size
78KB
-
MD5
77fa28e31ec25d1d8d1e639018d9b52f
-
SHA1
a7d364424df2b19000b76dadd0856fe107ed9f80
-
SHA256
8e04c42475bc3540925710dd1c71fad658b7cb19b6b2206fb59d0fea9b37cd2a
-
SHA512
445574d75edc96c67fe10b4c0ee12c6867015793d7b1672577ace4ada0717715d5aa66fe4fe14e7c32a5c355baf065e4e62a829cf6ed767b0454f8c02f434f74
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource yara_rule sample office_xlm_macros
Files
-
8e04c42475bc3540925710dd1c71fad658b7cb19b6b2206fb59d0fea9b37cd2a.doc windows office2003
wkmwdMaorjp
GvvbJIJYNc