Behavioral task
behavioral1
Sample
a40706996791650544631377f424caeb.doc
Resource
win7-20221111-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
a40706996791650544631377f424caeb.doc
Resource
win10v2004-20221111-en
6 signatures
150 seconds
General
-
Target
a40706996791650544631377f424caeb
-
Size
31KB
-
MD5
a40706996791650544631377f424caeb
-
SHA1
f65fb80429a46251b3e3a506b98932c4d4e99d69
-
SHA256
7ae1f5c92afdab7f71dc6ae0eb0afec6cb7c77184d6a588c2f1510d7a1896cab
-
SHA512
fc11aef2afdf223d1c2c0b617d3c704c578b407ccd52fedc8d2e63e7b5c6a34f8a715048c881d0a5fc8b4e001e9b1ab20ea887e785a2fa465ab6ba4a3fa4cd88
-
SSDEEP
384:zSqm38+peC/iNr6kzlkyzQ/ECktH+60jHuOK0nLmI:zSxM+peCqNrdHWEhk7Z
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a40706996791650544631377f424caeb.doc windows office2003