Static task
static1
Behavioral task
behavioral1
Sample
0a4315aced819ab564058480ffeeeb059756030d8c056605f2e0c6fc88b8b2f5.doc
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0a4315aced819ab564058480ffeeeb059756030d8c056605f2e0c6fc88b8b2f5.doc
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
c7ffbdf9_by_Libranalysis
-
Size
1.3MB
-
MD5
c7ffbdf964230b9cd90af3261cb90e0d
-
SHA1
3255159a1657316761bf98ecca96f091a4fbbcfe
-
SHA256
9c6241b1ccd67ad4439be584bf286f2f37c247217ffb59ab7031867c517abed4
-
SHA512
e852090e3440431b33efbd9ee9efa6e942c63b7b23625947d45ac71bb8e44428bab5bae669bba53c294250265b0be4db8cc79e433df4762bbd334ca35252db5f
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/0a4315aced819ab564058480ffeeeb059756030d8c056605f2e0c6fc88b8b2f5.doc office_macro_on_action
Files
-
c7ffbdf9_by_Libranalysis.zip
Password: infected
-
0a4315aced819ab564058480ffeeeb059756030d8c056605f2e0c6fc88b8b2f5.doc.doc windows office2003
ThisDocument
NewMacros