Behavioral task
behavioral1
Sample
110e73a28ac7c0ee8a8b7ea7e8714e90.doc
Resource
win7-20220812-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
110e73a28ac7c0ee8a8b7ea7e8714e90.doc
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
110e73a28ac7c0ee8a8b7ea7e8714e90
-
Size
65KB
-
MD5
110e73a28ac7c0ee8a8b7ea7e8714e90
-
SHA1
23310bcf85229c44c30b2259baa60a4fd522faaa
-
SHA256
170cf89d19bc72100c26ef66f85b331c8967cb18adb4265495f2538747f55ad8
-
SHA512
090ee7ada99cb8cff7456c3ad635180c5f10cbcedaf5fd3d7df54e11990d653406470c42201fb387ca58f2b849aca69eb1f4b8f5af20d4e63325b550e5866eec
-
SSDEEP
768:X/moQHdDF/GmhhhhaLrfDvNz8qQ3m6ncVDAPoj82xxlPiY:+oQHdDpjhhhh/3xQAPoI
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
110e73a28ac7c0ee8a8b7ea7e8714e90.doc windows office2003