Behavioral task
behavioral1
Sample
da5fea3efb1c32b9f1b68fe3d34835db.doc
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
da5fea3efb1c32b9f1b68fe3d34835db.doc
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
da5fea3efb1c32b9f1b68fe3d34835db
-
Size
12KB
-
MD5
da5fea3efb1c32b9f1b68fe3d34835db
-
SHA1
002a3a7d1d1837d0064ddd3d3e4d27b90cd18123
-
SHA256
f337146d4229155afc774f59ce4b6439fcf1d4d02ab00f3ffb20b71b3ce32af6
-
SHA512
7e485ed5aaf49ef0fff4a7836058183f5727d48de1f8c11c11116eef818d8594e35028737df3c158bd724b24332c60dbee22a763e098c80a1677c358e501ec71
-
SSDEEP
96:R+7Uk18pxee+mIET6FoHa4Ehb1vC+X4FXfWT4JlT3wYlEAgCT16c25gIMKyyli:gSxeeOETbHefNaXfvJlZlEDg16tgdKd
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
da5fea3efb1c32b9f1b68fe3d34835db.doc windows office2003
ThisDocument