Behavioral task
behavioral1
Sample
71e5d8e5a17b370ce22e0738db3978ca.doc
Resource
win7-20221111-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
71e5d8e5a17b370ce22e0738db3978ca.doc
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
71e5d8e5a17b370ce22e0738db3978ca
-
Size
1.7MB
-
MD5
71e5d8e5a17b370ce22e0738db3978ca
-
SHA1
921b7e965dbed4090a720928346a6e413e9303df
-
SHA256
9aad36e47f18e8bcf51de041bad26c1898387be9eb69c6792485699753321ac8
-
SHA512
3631f22b651379d09c62fe427b11fbb6d129ec2f5582b99b9099474c5e62575dfc84a6dd6690f54a06a5820cc931ed4d43518d9f314272ac5d0743dbfe9b454d
-
SSDEEP
6144:hTGSyMpODRFluwAnwL6IR4Mj1UoT2KJo81wmefyc6D02h4oahZnwm0H:ESv5wA04MdT8fy9LhXeZnwN
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
71e5d8e5a17b370ce22e0738db3978ca.doc windows office2003