Behavioral task
behavioral1
Sample
d41a67fa5e9596b64aecad79bcf5d12a.doc
Resource
win7-20220901-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d41a67fa5e9596b64aecad79bcf5d12a.doc
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
d41a67fa5e9596b64aecad79bcf5d12a
-
Size
41KB
-
MD5
d41a67fa5e9596b64aecad79bcf5d12a
-
SHA1
b18f19d0401857f4228b6bfe6dbd81b998383099
-
SHA256
7c7cfea2e2cf5d9c0ad6e2beb6c22ce45f3d38943d6b5f669d5b240296250a69
-
SHA512
391e69281ca70b16748701357afe01caf8ff41b7632865a907004aed034a358ddfa21e374031b136db494dc9ad1ff0625ee2a5eb7ee2be5726b748377441e6d8
-
SSDEEP
384:LtdYCHXDl3jCmmaLyUJMgsV9D0LZDUOB+qDDN0jIeGtUxuCc:LtdBl9maLyUJMLoLZDUxETe3xuC
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d41a67fa5e9596b64aecad79bcf5d12a.doc windows office2003
ThisDocument