Behavioral task
behavioral1
Sample
SecuriteInfo.com.Script.SNH-gen.828.doc
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Script.SNH-gen.828.doc
Resource
win10v2004-20221111-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Script.SNH-gen.828.27233
-
Size
392KB
-
MD5
652f9d5002234a0d64c81f40388b72f5
-
SHA1
63f99e72d49cd4a9ca4b66004dde936527d8d705
-
SHA256
032379588f82ad29ff299b883f71053850b145076cd3efd354f339982473dc32
-
SHA512
3a9157f5b89f181df66168f8778618f763f71d6442d6ee8689d2c8b0e0b068017888dfc00df9ebd34b02a16886fcd13acedabebcf02fe95bd3b362de6f2dd849
-
SSDEEP
6144:wh5CEqhx4eKc5b8MbhNBYebs37Km7Qe3a:Fxhb8ChK35Va
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
SecuriteInfo.com.Script.SNH-gen.828.27233.doc .27233 windows office2003