Behavioral task
behavioral1
Sample
6420638967c1f7b31f9c0ee9c9e21ff2.doc
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
6420638967c1f7b31f9c0ee9c9e21ff2.doc
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
6420638967c1f7b31f9c0ee9c9e21ff2
-
Size
49KB
-
MD5
6420638967c1f7b31f9c0ee9c9e21ff2
-
SHA1
6b0be0c292f71144b45083d79dfc8f1d3c890d7e
-
SHA256
406922d10a9dcee079c1856a4d2c7e2ce4ddc76ee34101abeadebf5b04b930db
-
SHA512
ce3783ad59917bc4a7ca576975db05abe6380806145bf76cd559bd815c0320175ce742e62f66c21d8451d448f22afab4cb8a7762827ddec2c8d2cb238593d77f
-
SSDEEP
768:6M2jFuR4Wgl9maLycxSaVU1FlHQT8VgWxlcW22eEDg16OR:Z2USl9maLycfU1km02eEDg16OR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6420638967c1f7b31f9c0ee9c9e21ff2.doc windows office2003
ThisDocument