Behavioral task
behavioral1
Sample
adebf23e3329ecd5a8d14ba3f65199c0.doc
Resource
win7-20230220-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
adebf23e3329ecd5a8d14ba3f65199c0.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
adebf23e3329ecd5a8d14ba3f65199c0
-
Size
88KB
-
MD5
adebf23e3329ecd5a8d14ba3f65199c0
-
SHA1
55af828ab1ccd492d75dc85c16cc47bad93d3872
-
SHA256
5e8c45e601782e800290a3c03e55c2a9a6ab2c402c333ca359a5e64e0adaaf51
-
SHA512
65bcb1c40b567e3fd7d88dac6cc37fc2ade8ca972b4be2b6e9d41bb23633ef62c0b9218677023c1abc43cdc4461e8f84aaca91f4545043f92ff87ac9d35072a9
-
SSDEEP
1536:sFNOO0TM49qpDQNN+T4P3xT1ZPbAxP3xT1ZPbeP3xT1ZPbD18P3xT1ZPbz7Ul6wV:sDOO0I49qpDQNN+T4P3xT1ZPbAxP3xTQ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
adebf23e3329ecd5a8d14ba3f65199c0.doc windows office2003