Behavioral task
behavioral1
Sample
e76b8666610a5e340c36524b763986fa.doc
Resource
win7-20220901-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
e76b8666610a5e340c36524b763986fa.doc
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
e76b8666610a5e340c36524b763986fa
-
Size
271KB
-
MD5
e76b8666610a5e340c36524b763986fa
-
SHA1
8ebc8f4211e6ac23832e96ea92523920bd9a9b63
-
SHA256
189e17b42f2563f20767fbff76003c017875a7cdcffa9ef4be3646ea3970e8e5
-
SHA512
8e2dbe307f61ef6bd050d90d181ccaa2dd325f461d63826a3cd7a82bac21b63911c401da302076cc6506e917218c174f24be557a4880cdcb2b168e658bf1ba94
-
SSDEEP
6144:GnGnqXazMOd3XErA6pWb5cVnGnqXazMOd3XErA6pWb5cm55W:gGqKzMiXExpWb+ZGqKzMiXExpWb+m55
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
e76b8666610a5e340c36524b763986fa.doc windows office2003