Behavioral task
behavioral1
Sample
8f43aa4407c0b7544ac193983bc8d58393f9ebf4dd5674204df3f70634c0e40e.doc
Resource
win10-20230220-en
5 signatures
150 seconds
General
-
Target
8f43aa4407c0b7544ac193983bc8d58393f9ebf4dd5674204df3f70634c0e40e
-
Size
545.3MB
-
MD5
5b5bec54f2acfa3c288f0c2f2e3984f7
-
SHA1
4b82fd1034f17d3ccae7c3d7adf2503b7a9833e1
-
SHA256
8f43aa4407c0b7544ac193983bc8d58393f9ebf4dd5674204df3f70634c0e40e
-
SHA512
e08097865ff2b8f7105e0eb9a7ff1bfe1beed09ee9f5790fae7c4cd672e8c36f5642b99ce2b940f0ac00a28aa0dcbf44f87c394b12dd435cf59edfa95a6a1b2b
-
SSDEEP
3072:PdObXXXW20dj1sZQ5hVYyQmBKe4ltVBjSBkzmlykp7WTDIrV2Dl9QjdDK6:YXW2M5V5oe4lBjSOz8zp7YDIr0BE
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8f43aa4407c0b7544ac193983bc8d58393f9ebf4dd5674204df3f70634c0e40e.doc windows office2003
ThisDocument
Module1