Behavioral task
behavioral1
Sample
015b4d2abbde3435ceb3f5cb01ebd839.doc
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
015b4d2abbde3435ceb3f5cb01ebd839.doc
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
015b4d2abbde3435ceb3f5cb01ebd839
-
Size
44KB
-
MD5
015b4d2abbde3435ceb3f5cb01ebd839
-
SHA1
dc2739df4408c304c9a051c2236bd8f6a287178d
-
SHA256
0e13d3558cc63c0b8df36bec1191082ea9f1c26381f2e6c775975f864fe4e7e3
-
SHA512
b0656a36809f6d548da2aa1dc44890b086217c3d49d91d6b7b532bee714d69e558f19d25216efd4d38817387e8e94c4bedcdcf33c9c3522d74dc40e66adc6eb2
-
SSDEEP
384:ARkbvDyCHVREliSZfI/PKRGisO8Jw6ec26KyJYdq60jG1txZ0PP:AADE5APopRc9KyJYdlp
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
015b4d2abbde3435ceb3f5cb01ebd839.doc windows office2003