Behavioral task
behavioral1
Sample
9ef99f832d3931f35674e1195e1b6d80.doc
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
9ef99f832d3931f35674e1195e1b6d80.doc
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
9ef99f832d3931f35674e1195e1b6d80
-
Size
22KB
-
MD5
9ef99f832d3931f35674e1195e1b6d80
-
SHA1
78bc18bb4f456e186e7065d2354edcf20e2b35ed
-
SHA256
9c25969f56082c1c42be87cd8d1433fed1e96df05f9a6bad01cd407d91584157
-
SHA512
9cf590a5928c1a84cd53ed38f77296181ebcf9b3af913db3b359cab97d829e8201b11693f8f70f26995e5c8efbd88ee69d9fd9e878c3227c0fa9b6073fd92f09
-
SSDEEP
384:LuHqvapamG1oev3aPMJAbuJ6oq8O2jFMujyV67JcNL+NBH4wuTRUEDg16P:OqSg/19v3aSyuJ6oqT2jFMujyV67JcNF
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9ef99f832d3931f35674e1195e1b6d80.doc windows office2003
ThisDocument