Behavioral task
behavioral1
Sample
629a54dc90a2e5081588cba36bd4f489.doc
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
629a54dc90a2e5081588cba36bd4f489.doc
Resource
win10v2004-20220812-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
629a54dc90a2e5081588cba36bd4f489
-
Size
1.3MB
-
MD5
629a54dc90a2e5081588cba36bd4f489
-
SHA1
b5f08efa70f3122777af75361b1cc409cb0b77d3
-
SHA256
fa4df9e1b3ed7129e0705cc3c4ccab55523c0b4f94604160728128d1cc76922e
-
SHA512
1378edd8d844d6775ee6aaabbb8e095aaf5c2d44fc3b78ed7537a415e7ce56035fd78d43b3098bac4d220d19c746bc5108823f31b4f6a4e677bc3009166b54c6
-
SSDEEP
24576:lEIZ4wA74D4SQKxZcy8gthDW8/chYusVNVQK0U/x8A:l+wJD4QZh/qaKMn70ux8
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
629a54dc90a2e5081588cba36bd4f489.doc windows office2003
ThisDocument
Module1
Module2
Module3