Behavioral task
behavioral1
Sample
a12acfaf288fe72810280fb6464787b5.doc
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a12acfaf288fe72810280fb6464787b5.doc
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
a12acfaf288fe72810280fb6464787b5
-
Size
12KB
-
MD5
a12acfaf288fe72810280fb6464787b5
-
SHA1
75668d36bd1acc88342d04140fb90d4d3160b99d
-
SHA256
6c697d65f281aa992d7413d2907d175726fabdecc9f437d3b1e16e800c76ff99
-
SHA512
78cb5d92d8adf21fc145a3c1c4a45ed3c953ccea9320cbdee81391138a8bd3de16a1d6f8ec1a7c67b8c7cad486eb2fcd220a83236620bec2cd74c25af0e10f2e
-
SSDEEP
96:RjOUSkgtk4Ik8d7fZFBeVLmL9t1OpQXb1vC+X0jbrGV7qNBtI5uIEY80rgCQ6c2j:lC+n7fr4cH1O6JN0j/GVGrtew0kd6Ha
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a12acfaf288fe72810280fb6464787b5.doc windows office2003
ThisDocument