Behavioral task
behavioral1
Sample
b01a27804bf0a2dffea40a3b40a5242e.doc
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
b01a27804bf0a2dffea40a3b40a5242e.doc
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
b01a27804bf0a2dffea40a3b40a5242e
-
Size
22KB
-
MD5
b01a27804bf0a2dffea40a3b40a5242e
-
SHA1
0a1c60289482a7fadc23bb0992f36f91b8437c80
-
SHA256
52f0a70fe14646898aaf6343d18aaaa45c5cbb41c210e4f37dc6b0fcd0853d4d
-
SHA512
9ef77d134decc003c1c0ac0c9a852368bb4c6db49b40ac238e2f02eb16016e4bfaf971d6eba3c03c4f4ada2d5606b16eb109a597b99d93ca89d69b490fdb1901
-
SSDEEP
384:ldS2STz+pek/iRiOT8yiPWOKkyzQ/xDQqNknm3Wc/MQb4l:Hq+pekqUOTdiOOCWxLNaE4
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b01a27804bf0a2dffea40a3b40a5242e.doc windows office2003