Behavioral task
behavioral1
Sample
c56a33e7b4f41557c46352352aa576d8.doc
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
c56a33e7b4f41557c46352352aa576d8.doc
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
c56a33e7b4f41557c46352352aa576d8
-
Size
12KB
-
MD5
c56a33e7b4f41557c46352352aa576d8
-
SHA1
90cc75fcf17c86bd2f2d90cd6d6f89a63ad7a963
-
SHA256
28dca45d982e622bd75896a572b43a7c3b6a4a78b16be64676306549bac26842
-
SHA512
056e2c98b77b1771deeb661142fc43151ca3dcfe50e38338101d992123a3be3a22d4a865e207827b41428326c63b0af6307dfcd4027a4b1bd1abdb36c218c4cb
-
SSDEEP
192:nUb7fr4cH1O6JN0jI9LGrtk1kd6azahE:PcRJN0jCqrtwkd67E
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c56a33e7b4f41557c46352352aa576d8.doc windows office2003
ThisDocument