Static task
static1
Behavioral task
behavioral1
Sample
fa964842244e752950fd4ed711759382a8950e13cc2794d6f73ab7eb9169e5ee.doc
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
fa964842244e752950fd4ed711759382a8950e13cc2794d6f73ab7eb9169e5ee
-
Size
94KB
-
MD5
ecf475aea6d373c61244f4db7d2ee595
-
SHA1
8f20b0a73d536e74c3c55d1fa98d07ab98ef46b6
-
SHA256
fa964842244e752950fd4ed711759382a8950e13cc2794d6f73ab7eb9169e5ee
-
SHA512
e2e9852a1de72e3e8d569842899c07f0be1d0305c75ac4bfa171ffda6d7d19298da492be2b11174ffe7ab29f379a592f68e30078dffadfdf414c94433bfac087
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource yara_rule sample office_xlm_macros
Files
-
fa964842244e752950fd4ed711759382a8950e13cc2794d6f73ab7eb9169e5ee.doc windows office2003
ONFNUlnU
sXZqiKirpODr