Behavioral task
behavioral1
Sample
dfe9a225d1ea8b36627865943c12e657.doc
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
dfe9a225d1ea8b36627865943c12e657.doc
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
dfe9a225d1ea8b36627865943c12e657
-
Size
28KB
-
MD5
dfe9a225d1ea8b36627865943c12e657
-
SHA1
62431d98bb1aac54e63f1636e493e620452d9b05
-
SHA256
eb58a0aecfc88a31962527589c17bd3b97f1ac7aab1a9bc7774d6a78617d1db8
-
SHA512
23310a11082e28785eefcf8aaf2975b50e16f4b703bb08a5b8d94dd9c234cd52749d66c3cd0a4e573db495803214139533d9af3d335b0a11c3dfade987a72bfc
-
SSDEEP
384:IpaxwoLZdU/mUITIkpeSpZEn+i23iCZ8hmgtbgVDjr8xMEXN1jL:GaxvIuDTDRi23ig8hmgpgVDjICE9J
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
dfe9a225d1ea8b36627865943c12e657.doc .vbs windows office2003