Behavioral task
behavioral1
Sample
02403f2bef90f107996c9e7a17732ffd.doc
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
02403f2bef90f107996c9e7a17732ffd.doc
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
02403f2bef90f107996c9e7a17732ffd
-
Size
18KB
-
MD5
02403f2bef90f107996c9e7a17732ffd
-
SHA1
0d740b984ba724bc55a141ecab5b43474cff6cdb
-
SHA256
48fae758c3398ef6307aa679f06178855c01d59b6163b9f25c6297bc7c57106a
-
SHA512
ae65f792bd1398e75a1217c61336490692b219b9635cc494035d8d995734aee69abf7185b0918914c8c2a2ebb8389e1fe149182c271f0fcc17a596b205ab748c
-
SSDEEP
192:JFADd3ekmOt7LPULH3+feN0jJPwmltn0Okd6uo+:4UvOt7bSXgeN0jNRlt0Okd6u
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
02403f2bef90f107996c9e7a17732ffd.doc .vbs windows office2003
ThisDocument