Behavioral task
behavioral1
Sample
Doc1_EvilClippy.doc
Resource
win7-20220901-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
Doc1_EvilClippy.doc
Resource
win10v2004-20220901-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
Doc1_EvilClippy.doc
-
Size
30KB
-
MD5
60d46af0f500125b3d49f685297e8b33
-
SHA1
471cf82445a2a8f36a0b80883b51b5f1cf1944ca
-
SHA256
f076274d1ec7ef443a1bb86174b87b8c494afd1fa39f925d8d31139d35be344d
-
SHA512
f529f97724dd017a3033982edcd7f2a5316d9361b00cd025efb479a5a779ec0e41e4a58d03e32dc7405ea7abaf281c0912f53b44a5b7aaec3b31679e3ca5dfb6
-
SSDEEP
192:gIlLZEvA+6/6rNavrgYjk+4bWlyA58ttzsMKhvjg0jCL7abLrkMso:gE8iSwvxjk+tyA0t7Sjg0jCmLrjb
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
Doc1_EvilClippy.doc.doc windows office2003
ThisDocument
NewMacros