Static task
static1
Behavioral task
behavioral1
Sample
RFP_AllianxMexico_2022.doc
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFP_AllianxMexico_2022.doc
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
RFP_AllianxMexico_2022.doc
-
Size
3.2MB
-
MD5
b371e1c2ca2e5718e151760bc4664366
-
SHA1
73457d23e5235df0fcfbf6547aaf26cccc765011
-
SHA256
3542078fd524e3cb141d5bebf96aea73467505a07ae72fc58395afa14f22e8a3
-
SHA512
b6d4ae4f09c8bb660d46dba8cce9a28a811af28f9364e38dc58da85bff011bf6ac21130a790a96ed9f015f27a916f6d8090a1712bb3f6192412f38381a7f4486
-
SSDEEP
24576:/HS4AwARd+X+i4Ht5O9SD++vxRC05yU3LahYcVy7eK+OuQAoKsn7uqb/H:fRyCpG/
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
RFP_AllianxMexico_2022.doc.doc windows office2003
ThisDocument
NewMacros