Behavioral task
behavioral1
Sample
94f3b316f3ee01caf02a92cf934db1a0.doc
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
94f3b316f3ee01caf02a92cf934db1a0.doc
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
94f3b316f3ee01caf02a92cf934db1a0
-
Size
68KB
-
MD5
94f3b316f3ee01caf02a92cf934db1a0
-
SHA1
e2f4826e4402d1b412d09a396fcde27e696a5994
-
SHA256
ac52c78311e567ba865a922bddf300cb6b972266b214d6c7a0a036962800cd27
-
SHA512
372d701a46cb592997c3d0859d1df1610a720478ba9e285f78f52f3ccb733dd524518859eadebda45f0a090d7fd1160fa035a5bac9c9a3d2a6fc7d42518b832f
-
SSDEEP
768:SYx4APFfq+peCqNrsWESSV4OBD1QvBHBrPjRVaGJ:pPw+peCm4WEJ4OBpALPjRVai
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
94f3b316f3ee01caf02a92cf934db1a0.doc windows office2003
ThisDocument
NewMacros