Behavioral task
behavioral1
Sample
1b8cc3a6caf1f2a797e55661df69e1a5.pps
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
1b8cc3a6caf1f2a797e55661df69e1a5.pps
Resource
win10v2004-20230220-en
12 signatures
150 seconds
General
-
Target
1b8cc3a6caf1f2a797e55661df69e1a5.ppa
-
Size
56KB
-
MD5
1b8cc3a6caf1f2a797e55661df69e1a5
-
SHA1
b644882b78bcaa8d435ed6cd8f3718e70cd33766
-
SHA256
d42cf1aa9737e9ee24d49805db194c72d799608174b6335bcb8d7a0798f9ddb3
-
SHA512
8d25c44dec30b678aa194ffd4dad3b29f6ef8a873e0875706746d57ca9ac8e377c4976fc086f042fa2255ec9fd5473c2531c0b5ea5c929f470369de5a8263793
-
SSDEEP
384:aH5Rkte4VCa5px6RUrhr99JrDucC9Q8UfTb:fte4VCa5p4RaxfgcCVU
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1b8cc3a6caf1f2a797e55661df69e1a5.ppa.pps .ppa windows office2003
Module1