Behavioral task
behavioral1
Sample
d52451d33bcea5e168eec0b7b556ffa8.doc
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d52451d33bcea5e168eec0b7b556ffa8.doc
Resource
win10v2004-20221111-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
d52451d33bcea5e168eec0b7b556ffa8
-
Size
28KB
-
MD5
d52451d33bcea5e168eec0b7b556ffa8
-
SHA1
ea5c246e9eb9554fd103af8208cd52b32a6a6fce
-
SHA256
b0b72a578897931d06c3b4bef171b0539ef90c7de46d204499d713300c84d8fc
-
SHA512
5ec0e50f21eb1932cead78803d0853498fa660dfdcf0789f86edd51d03d86efe8de876ed419553a8111e024f409a097810370f727b202dd19433f3711640c6a0
-
SSDEEP
384:faA/jf4iDs6+GKLv9C8klNpZc1IaCt1P6qDQDFXqG5Q/Q50nN1jS:SAsiDs3NFdklNpZc10HPIDFXa/c0Ns
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d52451d33bcea5e168eec0b7b556ffa8.doc .vbs windows office2003