Behavioral task
behavioral1
Sample
f414b3d40f885585902e85acf4148c47.doc
Resource
win7-20221111-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f414b3d40f885585902e85acf4148c47.doc
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
f414b3d40f885585902e85acf4148c47
-
Size
37KB
-
MD5
f414b3d40f885585902e85acf4148c47
-
SHA1
6ddfe4e0e40af1786ef7523a6a722259e894332d
-
SHA256
7f3cdf1eb06320c329acaec4b1926e86776b49d7057e5101b15bf9525f201089
-
SHA512
aa47a5844ac545ecd0e15f6487b7e0e8fd2cf8e07aaa0785a391a645b94aaf501224476eaab27511dac9a37c3e6509b765e4f4b3389f8c64d223542ebab082e9
-
SSDEEP
384:KvZeQIsgn+BjOpzdXMu0Q9lIqIM82xZhe70jF2tOrYDg163AYI:KRBIsWuPJkG7oTYDg163pI
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f414b3d40f885585902e85acf4148c47.doc windows office2003
uJvbzmAijCNd
RXUVFhlzzAfO