Behavioral task
behavioral1
Sample
69d946d288100779902709912eba926d1835d026c9d525450fab870e4b5c4ca9.doc
Resource
win10-20230220-en
5 signatures
150 seconds
General
-
Target
69d946d288100779902709912eba926d1835d026c9d525450fab870e4b5c4ca9
-
Size
511.3MB
-
MD5
e7fb83e236a664763d53dd63803a233b
-
SHA1
221f7f1ba21dff6c6113d52d66c1c9e58da346b1
-
SHA256
69d946d288100779902709912eba926d1835d026c9d525450fab870e4b5c4ca9
-
SHA512
e2fd70a3abfe6d8803d3b4ec87fd81d087a3845d86293b965db9c28d45e30a0e2d50caf1fe7a20b194769a46de7a9ab282a6a463bf9dd7b165c71c6894702b5d
-
SSDEEP
3072:PdObXXXW20dj1sZQ5hVYyQmBKe4ltVBjSBkzmlykp7WTDIrV2Dl9QjdDK6:YXW2M5V5oe4lBjSOz8zp7YDIr0BE
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
69d946d288100779902709912eba926d1835d026c9d525450fab870e4b5c4ca9.doc windows office2003
ThisDocument
Module1