Static task
static1
Behavioral task
behavioral1
Sample
14ab848a21e4370cbecb5bce9b9233d37aa0d9a02dd7e3aa32fb1ccdf052b07c.doc
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
14ab848a21e4370cbecb5bce9b9233d37aa0d9a02dd7e3aa32fb1ccdf052b07c
-
Size
82KB
-
MD5
d8cf142293ff0dda1cc5bc5d40804b97
-
SHA1
beacebcca4ba412437b0c6f3c35ec63d0d90b3bd
-
SHA256
14ab848a21e4370cbecb5bce9b9233d37aa0d9a02dd7e3aa32fb1ccdf052b07c
-
SHA512
a2bd79e9ea9760402536d20bf18e64486e54450fd0b9ce0d99ee26000acfd2abcfa1197de2ddc0cd352a8d4c8095e9604d713c55f6bb78cccf320faacf1b9ca8
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource yara_rule sample office_xlm_macros
Files
-
14ab848a21e4370cbecb5bce9b9233d37aa0d9a02dd7e3aa32fb1ccdf052b07c.doc windows office2003
jVYtUPcqB
AQniZNf
ErFjwCpzujvROj