Behavioral task
behavioral1
Sample
374c4a051e97d1aebb271271a65875ce.doc
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
374c4a051e97d1aebb271271a65875ce.doc
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
374c4a051e97d1aebb271271a65875ce
-
Size
49KB
-
MD5
374c4a051e97d1aebb271271a65875ce
-
SHA1
4f9386c5c4f208759fbed6e1acdf70a6710d1aee
-
SHA256
f9ad790588f1891a537f6adadde65c15a7d734e5728afd019639ace1aadd9071
-
SHA512
5a362b359632fb5721d9c34516a2382adde16cdb9a3c8956d77eb153726a53980527f0703b1150402957a1220ac8d567298ef1551b4a0ce816c69da783ab9a8a
-
SSDEEP
768:YG1jFuR4Wgl9maLycc8SaVUhCGVgQT8VgWAYcW9u6EDg16f:l1USl9maLycvUhCqmJu6EDg16f
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
374c4a051e97d1aebb271271a65875ce.doc windows office2003
ThisDocument