Behavioral task
behavioral1
Sample
20230308_79251_007.doc
Resource
win10-20230220-en
5 signatures
60 seconds
General
-
Target
6f9218b4e8ad6fd3d974a5a9a56c0a5c7c2a651a56ab14ce62397bf7494772a9
-
Size
698KB
-
MD5
4dfc2a6aae4a4e98745e8cddd231b8e5
-
SHA1
c9e6b96b9739a9dc4c450a1d6ca3fa1e7dee28fb
-
SHA256
6f9218b4e8ad6fd3d974a5a9a56c0a5c7c2a651a56ab14ce62397bf7494772a9
-
SHA512
4294a0d507caa5a1155c39dbe0bd91c242c6be0cc425fc9ea8752babe2e7d08a046f95196f1092a575059dbd58276b5fc729e49a4593645324be80da5094f832
-
SSDEEP
6144:DJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqi:XbPHom8TYyCT8x5I5wb
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/20230308_79251_007.doc office_macro_on_action -
resource static1/unpack001/20230308_79251_007.doc
Files
-
6f9218b4e8ad6fd3d974a5a9a56c0a5c7c2a651a56ab14ce62397bf7494772a9.zip
-
20230308_79251_007.doc.doc windows office2003
ThisDocument
Module1