Behavioral task
behavioral1
Sample
76eccef1530c5d824e5fc90f0b337a6b9f3ea995.doc
Resource
win10v2004-20220812-en
6 signatures
200 seconds
General
-
Target
76eccef1530c5d824e5fc90f0b337a6b9f3ea995
-
Size
43KB
-
MD5
71487ea8e9b934c80c105ca5199a5a37
-
SHA1
76eccef1530c5d824e5fc90f0b337a6b9f3ea995
-
SHA256
902445711c3e697f432e4fc54ed6614a236599655484691a9b6c0bfb1051c928
-
SHA512
bc29e966de955bccf5f9b64a3452fa32fae5d605637be4053b65c0a3b37afcf03b5ae3f5de7d4a6b4c69eb73407abf39e994559f08dea2445d950b39e0fc9df4
-
SSDEEP
384:KIIyIooArcc6bWiS5GspAHKekE2ub+peH/iHGun6f0eFzTCxAyFT0j1sJK03tU:IqjE/+peHqmWtEeV37
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
76eccef1530c5d824e5fc90f0b337a6b9f3ea995.doc windows office2003