Behavioral task
behavioral1
Sample
e108036b2269cea9072b51f7a5645740.doc
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
e108036b2269cea9072b51f7a5645740.doc
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
e108036b2269cea9072b51f7a5645740
-
Size
21KB
-
MD5
e108036b2269cea9072b51f7a5645740
-
SHA1
642cf06d812e9e822dbcef404a8f4ffa14690e9a
-
SHA256
d389909c34d00248d0b07bda1aea5d07eed77932f80a4f42c9cf3fd59f8a55ef
-
SHA512
9906c4af01c8d0db462ddad924dfdb5d3619dfd76b926fd0d451ac970f68999a3029b8d95a4376482e9dffcdf4d0553ae7049eee12db82c7b9ecbd12c4817f3e
-
SSDEEP
384:wtn+pek/iWcS111lkt56tTsukyzQ/BDQ6yB50jRJQKEMtHU:wn+pekqWF111i56hWBobsCj9
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
e108036b2269cea9072b51f7a5645740.doc windows office2003