Behavioral task
behavioral1
Sample
8dd326ec396dc64608a7373d768708fc.doc
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8dd326ec396dc64608a7373d768708fc.doc
Resource
win10v2004-20221111-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
8dd326ec396dc64608a7373d768708fc
-
Size
24KB
-
MD5
8dd326ec396dc64608a7373d768708fc
-
SHA1
182924ba96bd9f80fc0fef96e5ed332abd3a5998
-
SHA256
7ac98b74569aa7ed49ff14258faa6e426c216e040c586ff57576e3e97f631539
-
SHA512
69d0fbdf0baa14d570dd5152a0608059ee89b8fbed63f294776f009adee07200f07057a20f0ce59b94cd2450dbeca2361ca90023cc640b9eb587a3dcda1a744a
-
SSDEEP
384:+jHi9+peQ/iIgPZ9JhTUxukyzQ/KJCvBCs3s0/ME8rXEkpJR:f+peQqImZ9JVWYSCsOZXEkpJR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
8dd326ec396dc64608a7373d768708fc.doc windows office2003