Behavioral task
behavioral1
Sample
2022a197d3c310089af185ed360160b5.doc
Resource
win7-20221111-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2022a197d3c310089af185ed360160b5.doc
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
2022a197d3c310089af185ed360160b5
-
Size
79KB
-
MD5
2022a197d3c310089af185ed360160b5
-
SHA1
ec3edc1fcc4a7f1e99e2207656a5b506579392dc
-
SHA256
b09000319af4bc67d8d955c8cc5fec15493f8dcb2a2c14900a2c82322447d750
-
SHA512
e24ab6ea4a11413ebd3c00e47f50247da3a6a45aa683efe6edbb2d17a6e20c29e54aab792076f138ea6d9a0d35c1113335c2bbe936cfed83d89d2c5284a0a416
-
SSDEEP
768:ASmCLzfy5TFCOSPjS7KDPjlqiK+fx2cv14zj6HzVaK4KaGpWm4c0iAqewliT4Sm7:Jm15g1jS2Xwr+5U6HsgWabAT/T4Sm6e
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2022a197d3c310089af185ed360160b5.doc windows office2003
AIIfUddBvsC
mTDiVPJjjQLbi
aPPnsUziqWni