Behavioral task
behavioral1
Sample
d4be9789290727eac890c83e5dd28833.doc
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d4be9789290727eac890c83e5dd28833.doc
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
d4be9789290727eac890c83e5dd28833
-
Size
42KB
-
MD5
d4be9789290727eac890c83e5dd28833
-
SHA1
2d6c6fd6a68e01c8dbb2fd27903d973259bf3d3e
-
SHA256
48f021d7fc3301f9a184a3f0cc444bf1086940221682ef42fd070973a33a8f8a
-
SHA512
c15078d82e29dfb0e804650a83306ceb851bfaf2edd31bc35433319a9dde1ae346d249e34bc232391e7a4d41d949e140ed4b590ff1a8d48e8299f1c5b115c702
-
SSDEEP
768:+19v3aZ58hyuJ6oqT2jFMujyV67Jc+qSbxCBlztWLikEDg16SXg/u5:+19vKqyuJ6MB3AAumikEDg160g/O
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d4be9789290727eac890c83e5dd28833.doc windows office2003
ThisDocument