Behavioral task
behavioral1
Sample
6a2178639dbebae9ba303db01fe4a9ed980c493f9e21a0425206f325b025fe9e.doc
Resource
win10-20220812-en
9 signatures
150 seconds
General
-
Target
6a2178639dbebae9ba303db01fe4a9ed980c493f9e21a0425206f325b025fe9e
-
Size
223KB
-
MD5
7b72bb0b6f757aa8e6e153cf6239bfb9
-
SHA1
6e7775277b18a481ca4ce24d5e13fd38ab1b5991
-
SHA256
6a2178639dbebae9ba303db01fe4a9ed980c493f9e21a0425206f325b025fe9e
-
SHA512
3cea6fd86fd876d2d78dad39de491ef780b26f07586472ea528c82e3fe94b14dad2c5c8d06eb8cfe2959bce90326cb4fad08581ff2ac243d198e2633de549644
-
SSDEEP
3072:4v7hTbbbr8Jg5xHfYejZtZBhC+eJbYFBGwiA4XTtvEiDWHoOtxfTp8z3a66lgWxY:uTbbh5xHfYK5yhYruJ2H1T87TXWd0
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6a2178639dbebae9ba303db01fe4a9ed980c493f9e21a0425206f325b025fe9e.doc windows office2003
ThisDocument
UserForm1