Behavioral task
behavioral1
Sample
0c2b86207c0a0b6ecd8fc652b35510e7.doc
Resource
win7-20221111-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0c2b86207c0a0b6ecd8fc652b35510e7.doc
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
0c2b86207c0a0b6ecd8fc652b35510e7
-
Size
24KB
-
MD5
0c2b86207c0a0b6ecd8fc652b35510e7
-
SHA1
ad4ad8a16a99e0eab21a5c605f20a122875b9f53
-
SHA256
fa9dbf9b0d50326d035ad1bbcc2b33476c17d1d60681bd47c41f5654394cdeb5
-
SHA512
9a070d82766ec6e2e749361f6559317007b12cc44e6e1a524be3dc8b56382c5e906b54479e3cdd211721375696fb1ee2641fd876c19b20c3332a46299ea6c42d
-
SSDEEP
384:tFBasCT0MDBvL2g1ILXsgvGgNtmjyxhJ3RFEDg16p6zx8e:fAsCI3QILcmhtmIhFEDg16p69F
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0c2b86207c0a0b6ecd8fc652b35510e7.doc windows office2003
ThisDocument