Behavioral task
behavioral1
Sample
e26612022ef599487e71c825ce7645a9.doc
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
e26612022ef599487e71c825ce7645a9.doc
Resource
win10v2004-20221111-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
e26612022ef599487e71c825ce7645a9
-
Size
24KB
-
MD5
e26612022ef599487e71c825ce7645a9
-
SHA1
4727cb5958793a33e2adc336a7fb1230d3d8c5a7
-
SHA256
8e94320d298647847db0cf609b98f15a6e9c6db86f6267a34e8f25950ba0b4ae
-
SHA512
de49b5359f31c2cb8dec577e377346424112657b716ab7926c9476d032de7f74bd6dd36fce15f62f0e41376a635692fa9eb9ad9ed4f6b8bf29a691cc5bb0df3c
-
SSDEEP
384:hQqvh+pek/ivoPZ9JPTxpukyzQ/MDQg0bmW1RnDfau/M6U29HeGax:R+pekq2Z9JSWMb0bt1RAJ29HeGax
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
e26612022ef599487e71c825ce7645a9.doc windows office2003