Behavioral task
behavioral1
Sample
d4ba87b51437b195e36a3c94ec1b03c2.doc
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d4ba87b51437b195e36a3c94ec1b03c2.doc
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
d4ba87b51437b195e36a3c94ec1b03c2
-
Size
49KB
-
MD5
d4ba87b51437b195e36a3c94ec1b03c2
-
SHA1
30a9b3d60cfedee016498688fe86429ea63a6a1d
-
SHA256
a6e8913cc2d2ec504051b31545297605f8579afd36c6c87906fd13445cd03746
-
SHA512
8aa24c0733c48b5829b8af3a8350306992993a178840e26b3a08806920080b52384e46b4d19bd63521c8e0e05c4cb256f875971c33aa0422013cc1b788c4d99a
-
SSDEEP
768:gjqjFuR4Wgl9maLycNSaVUcHDpQT8VgWw4cW+FNEDg169:AqUSl9maLycDUcOmuFNEDg169
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d4ba87b51437b195e36a3c94ec1b03c2.doc windows office2003
ThisDocument