Behavioral task
behavioral1
Sample
98b8bc053aa48a82968d9d3481d2e622.doc
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
98b8bc053aa48a82968d9d3481d2e622.doc
Resource
win10v2004-20221111-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
98b8bc053aa48a82968d9d3481d2e622
-
Size
25KB
-
MD5
98b8bc053aa48a82968d9d3481d2e622
-
SHA1
0d2c7d4cbdc1ac8df1b89737e70e8aa999920400
-
SHA256
ea4f1df3a4649d42f2428b4f1f1e284035603da7195fbf82a37b82bda466bb97
-
SHA512
aab87986423abb39aed8daa52658d837247a16c3f96bce753725f599d8c8841348cbd99f7d9b68e6d5e1fc525d68f2173348500ed488cbc27a0e611f092725cc
-
SSDEEP
384:pl1TyC+peE/iKcR9PZDMPZ9JXTTxlukyzQ/cfCcPQ0j3QKEVrtUDp:7VD+peEqKAoZ9JyWan4fjMp
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
98b8bc053aa48a82968d9d3481d2e622.doc windows office2003