Behavioral task
behavioral1
Sample
d134777e5ee0f6449086553b44e9fed3.doc
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
d134777e5ee0f6449086553b44e9fed3.doc
Resource
win10v2004-20230221-en
4 signatures
150 seconds
General
-
Target
d134777e5ee0f6449086553b44e9fed3
-
Size
49KB
-
MD5
d134777e5ee0f6449086553b44e9fed3
-
SHA1
74ff2754e74c71b21aeef9f97b41acf55bc39852
-
SHA256
ea070df5e73353148ccdb59b5e52b3c6eb0d81302696b881c7a352c7469ec218
-
SHA512
89019c851b8a8f61f3425121d5a9782be14190dd4af9f2c1fe1f2670a448ffa57cc738a9ab0273df3459f38e9417695b41e88bcecdc1d284c38cf00b340f78df
-
SSDEEP
768:CLKjFuR4Wgl9maLyc4SaVUAyhQT8VgWvXcWwvpEDg161l:aKUSl9maLycQUA7mivpEDg161l
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d134777e5ee0f6449086553b44e9fed3.doc windows office2003
ThisDocument