Behavioral task
behavioral1
Sample
c046cb1f8b6077ff16f3f31382d46c22.doc
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c046cb1f8b6077ff16f3f31382d46c22.doc
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
c046cb1f8b6077ff16f3f31382d46c22
-
Size
12KB
-
MD5
c046cb1f8b6077ff16f3f31382d46c22
-
SHA1
30bb6e8fd2c5275e3936461b960af51e0c7abd6e
-
SHA256
f902a5ab93f270fe755b060d59f1abf5046eea2172c3da5db8508fb3e3068257
-
SHA512
21eb19337608c11872d311d90d5b80afd6e0143f6a11d82753278c5217cc8a10117e087a73a13f1a2079f7eaf1d8e27b95df46377cae63923f8b1f51347929c8
-
SSDEEP
192:NJdQxeeOETbH9fN5Msfv8lO3LEDg16d7Khnbi:PETbdfNSwCO3LEDg16Uti
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c046cb1f8b6077ff16f3f31382d46c22.doc windows office2003
ThisDocument