Behavioral task
behavioral1
Sample
d6b4e92195c1df8c4b9e042b65384306.doc
Resource
win7-20221111-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d6b4e92195c1df8c4b9e042b65384306.doc
Resource
win10v2004-20221111-en
0 signatures
150 seconds
General
-
Target
d6b4e92195c1df8c4b9e042b65384306
-
Size
12KB
-
MD5
d6b4e92195c1df8c4b9e042b65384306
-
SHA1
826714f6a070455252d41bdf49689b7dd7b6797c
-
SHA256
b8645284dfd77c70709e28078d57ba7bd36a0e551a0c98f0f86a8ba9d14a8fb3
-
SHA512
0141950329fa9064950b24ee7ac98f1ce6d98bd8e9446212922ef2c5b9c0acb42fb7cd72db8bd80b3f406dd63df9f4360cb5b8cb22fac3b14f780ce9e80a7d62
-
SSDEEP
96:R+OURNYk4Id8d7fZFBeVLmL9t1OpQXb1vC+X0jVUVz7qNBtC5uI2YXrgCQ6c2Zjt:s7lC7fr4cH1O6JN0jeVzGrtYpkd69a
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d6b4e92195c1df8c4b9e042b65384306.doc windows office2003
ThisDocument