Behavioral task
behavioral1
Sample
ce8a4ff7f97d35dc4aa9e0b0e512fba40bebed8aeeb2b8284e5e5dd054973e42.doc
Resource
win10-20230220-en
5 signatures
150 seconds
General
-
Target
ce8a4ff7f97d35dc4aa9e0b0e512fba40bebed8aeeb2b8284e5e5dd054973e42
-
Size
533.3MB
-
MD5
440c06a8e35178c48416b0e4f601e5dd
-
SHA1
434b01b20a658d76a4d002f5f428c508432f1f5e
-
SHA256
ce8a4ff7f97d35dc4aa9e0b0e512fba40bebed8aeeb2b8284e5e5dd054973e42
-
SHA512
88a003180b96ee207e9b97fec1840164f688c8d8964bb7df998cb3fe6e93f0faee4af46ef6f48f2e235acc0d22d1438690f9ffc574770a2612605594016a5b66
-
SSDEEP
3072:PdObXXXW20dj1sZQ5hVYyQmBKe4ltVBjSBkzmlykp7WTDIrV2Dl9QjdDK6:YXW2M5V5oe4lBjSOz8zp7YDIr0BE
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ce8a4ff7f97d35dc4aa9e0b0e512fba40bebed8aeeb2b8284e5e5dd054973e42.doc windows office2003
ThisDocument
Module1