Behavioral task
behavioral1
Sample
0fefb55b615a2f9627c385074cdddf0d.doc
Resource
win7-20220812-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0fefb55b615a2f9627c385074cdddf0d.doc
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
0fefb55b615a2f9627c385074cdddf0d
-
Size
43KB
-
MD5
0fefb55b615a2f9627c385074cdddf0d
-
SHA1
d407ca73a8a2824722da6dea7eb0835918ef8ed0
-
SHA256
1e16c7dbcf18e8521096e1236b94a2ea1b9444a690a828f2255011eb45ef6511
-
SHA512
6cd0100dbe8f152dd8f265a07d8013389d454556470790fa07653b78b3ae14b4d127d1946a4fb2203ef5971a4b92f388cffae83400e2482c2db7287db59b86a0
-
SSDEEP
384:qvIr6PxXscidjfkViSZfI/PKRliV1JBmCJJjXGtRIsGVaGh8PwXw0jz:qIr6PxckJAPoCJBmCJJIlGVapwg8
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0fefb55b615a2f9627c385074cdddf0d.doc windows office2003