Behavioral task
behavioral1
Sample
8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5.doc
Resource
win7-20220812-en
11 signatures
10 seconds
General
-
Target
8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5
-
Size
79KB
-
MD5
39de314ca12ec81359cbd1fabc12cb98
-
SHA1
d23e18a068f0ffde1fe7dbffbfa86ef459e3ee57
-
SHA256
8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5
-
SHA512
67eb2a93e509ec34999f21757069d0729d06146796253e198d0449f2dfa83568a290cf7397a628a7489e2958fe61a45a387a1d3517397a79499f07ea0adfca73
-
SSDEEP
768:ixbpML2teJsNST+jBl8UDRxz99LHy85ZKYbkr+H/l7eYk3I:+M6ZNSTOl7DR31y8eYS+H/sj
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5.doc windows office2003
ThisDocument
tmpECCB
Module1