Behavioral task
behavioral1
Sample
b0f5f09361c437b3089b7d8a41109b5f.doc
Resource
win7-20220901-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
b0f5f09361c437b3089b7d8a41109b5f.doc
Resource
win10v2004-20220812-en
12 signatures
150 seconds
General
-
Target
b0f5f09361c437b3089b7d8a41109b5f
-
Size
1.3MB
-
MD5
b0f5f09361c437b3089b7d8a41109b5f
-
SHA1
4edac531debc01299125f36ca81d161a623a993f
-
SHA256
1398fb60ae58e5638872a2bd7abe98e89263a25a59a9c88c95135512ed04bc71
-
SHA512
f363ccb795d1bf6de9d07acce5fbbe6dc43fe5ac5b7df851f6036224065cd47dc6970cb98df3d768e25b16980aa14e03ca949fad603a12c11acf9471945f1c23
-
SSDEEP
24576:fEIZ4wA74D4SQKxZcy8gthDW2/chYusVNVQK0U/K8W:f+wJD4QZh/qkKMn70uK8
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b0f5f09361c437b3089b7d8a41109b5f.doc windows office2003
ThisDocument
Module1
Module2
Module3