Behavioral task
behavioral1
Sample
40395a27048ad5f95f58b378c12d2ce6.doc
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
40395a27048ad5f95f58b378c12d2ce6.doc
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
40395a27048ad5f95f58b378c12d2ce6
-
Size
107KB
-
MD5
40395a27048ad5f95f58b378c12d2ce6
-
SHA1
2f93359abac511e34d6f3ad5b137d85e23bf0849
-
SHA256
fe837b9e3bc60e394e904119dd240a82770691e1372012ad0f0a70a98eeec510
-
SHA512
b5e97c379af2bf25ab7cba72f53425b3da9b9632e5fb64be456f672c7926a4f8988f450528ae31adfcc058f03d1eedaac4491a44d679cc52eb32bf828f001f2e
-
SSDEEP
1536:VFvxqZyaw/JAq9L2eAraa1XmQkVXWweYNJ4Q2wdx7/sdQMgwrLp504NEsvStFV:VFvxOt3ItWwdZ2wLLMOKd504NqL
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
40395a27048ad5f95f58b378c12d2ce6.doc windows office2003