Behavioral task
behavioral1
Sample
756fe5c259f82709d18d236cbd0f2d1a.doc
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
756fe5c259f82709d18d236cbd0f2d1a.doc
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
756fe5c259f82709d18d236cbd0f2d1a
-
Size
49KB
-
MD5
756fe5c259f82709d18d236cbd0f2d1a
-
SHA1
c1579b2aff0806fd389b6085fb6c7f09c6138fbe
-
SHA256
e5607be636ca411a2cbb9d1afb0a90053d33662491014253f8720fb03898cb79
-
SHA512
d8d344348605ccda3d35b4f3747b575777fa2b9c7528b44f8b578da346648c91952fb842b19cc8cb8a9801fc85040fafff19beab42e8a5722809a24d7cdc6551
-
SSDEEP
768:7v/jFuR4Wgl9maLyc/SaVUhQdiQT8VgWSYcW4mpEDg16wZ:D/USl9maLyc1UhWmmmpEDg16wZ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
756fe5c259f82709d18d236cbd0f2d1a.doc windows office2003
ThisDocument