Behavioral task
behavioral1
Sample
form 03.07.2023.doc
Resource
win10-20230220-en
5 signatures
60 seconds
General
-
Target
ee8ad9e98a8c72a6d7d860a599a07af5aa9968e61f53be9944be21a88ad73f7e
-
Size
680KB
-
MD5
05261ce4487d32face5ddccafbd04ce5
-
SHA1
231858713bf5cef740a6640e428e105351e4631c
-
SHA256
ee8ad9e98a8c72a6d7d860a599a07af5aa9968e61f53be9944be21a88ad73f7e
-
SHA512
91184a78a82017fbad619641476b40173ae8d17fefb6cc11bab398fb275f26394997ba1858005bd15fae89e92ecaff806d0587381520b04b8f93d187be46dc84
-
SSDEEP
6144:HJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqP:7bPHom8TYyCT8x5I5wO
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/form 03.07.2023.doc office_macro_on_action -
resource static1/unpack001/form 03.07.2023.doc
Files
-
ee8ad9e98a8c72a6d7d860a599a07af5aa9968e61f53be9944be21a88ad73f7e.zip
-
form 03.07.2023.doc.doc windows office2003
ThisDocument
Module1