Behavioral task
behavioral1
Sample
e9cf1194c4a01dd350d3af0b1afda7f7.doc
Resource
win7-20220812-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
e9cf1194c4a01dd350d3af0b1afda7f7.doc
Resource
win10v2004-20221111-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
e9cf1194c4a01dd350d3af0b1afda7f7
-
Size
42KB
-
MD5
e9cf1194c4a01dd350d3af0b1afda7f7
-
SHA1
ea91861865171421a3e77398451f635826c1891d
-
SHA256
19bc40c3840a5bd86e372c0e3d5c0ce327a17e0b887a743f7139bb48f7cadd43
-
SHA512
2b1d3983d14d1cf17f6d2784e2250956e6610a597c049653b211aedf02870667cd0be262ceeac5c7533227a4898d36beea58a0afe83b187ef785763303e8e5b1
-
SSDEEP
384:PGbiSHuT7Uz64PFHjlqh5DhxPccdZlDm1hNCpRP0jUEyMtj/:97UVPFHjW51ZlK1h0pdDE
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
e9cf1194c4a01dd350d3af0b1afda7f7.doc windows office2003
ThisDocument