Behavioral task
behavioral1
Sample
e63e7d504e7fc85e232655c0c1370ddc.doc
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
e63e7d504e7fc85e232655c0c1370ddc.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
e63e7d504e7fc85e232655c0c1370ddc
-
Size
51KB
-
MD5
e63e7d504e7fc85e232655c0c1370ddc
-
SHA1
45e8a2c8738ab26a65888c2f9bad5b6f1a28dd3c
-
SHA256
8fd3580c483290e483944d36215b982a533f038c703dc4468ccfd85e72272a2f
-
SHA512
ca6a0d3e6b6f7faec949caac328d63f551ba04b43354a0c58b239156555a98931db8d411331b4d63a0c615a27c058ecdf4cbc7a0d1bdebbeab32e07c4219cb86
-
SSDEEP
768:WZwWhlpR4Wgl9maLyVSaVU6rQT8VgWu5cWyUnEDg167n:4hl7Sl9maLybUtm/UnEDg16j
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e63e7d504e7fc85e232655c0c1370ddc.doc windows office2003
ThisDocument