Behavioral task
behavioral1
Sample
0c4694f19f83ea97b5bbaa73531de872.doc
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0c4694f19f83ea97b5bbaa73531de872.doc
Resource
win10v2004-20220901-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
0c4694f19f83ea97b5bbaa73531de872
-
Size
24KB
-
MD5
0c4694f19f83ea97b5bbaa73531de872
-
SHA1
e6f1dbf2f84dc7b5c324d0931780e7312b9eddc4
-
SHA256
fe8e818202b81c12aa25f9fee4bb31a71791b519285123a3a892216969eba201
-
SHA512
f344c9632007ae615872edd2ce80e8ab5c4b9beb4a2d0c01fd9c3358d145720d00e3f966667868d67722e206828c0409b5fe06ea24ac32ae9035f5b578840954
-
SSDEEP
192:UzEWzvcPawQM7vz0x42Ym39NvpE3EiRcx+NSZXKOValoqtOU0eJbUZSmulW67njO:UtwQkvz0RYm39QVNzOValXoU00Hmu
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
0c4694f19f83ea97b5bbaa73531de872.doc windows office2003