Behavioral task
behavioral1
Sample
11224b24b3619d4ebfe265875f9745fc542553158813aa112d77a0cb4fe654cc.doc
Resource
win10-20230220-en
5 signatures
150 seconds
General
-
Target
11224b24b3619d4ebfe265875f9745fc542553158813aa112d77a0cb4fe654cc
-
Size
505.4MB
-
MD5
9f436098a3a2acd867a23ba4d00be24f
-
SHA1
6ffa087b98d968e326c3f8365ff14a9f3e3f0659
-
SHA256
11224b24b3619d4ebfe265875f9745fc542553158813aa112d77a0cb4fe654cc
-
SHA512
ab9f91583656d8f3002a667c6bde72f202e7c48ff89c77a7be68a78dd92eade668b74c09dc612332fa5da85f1260fa447b2119f0007754069cb034b7d930f223
-
SSDEEP
6144:ogJI9kbGiyDlVYoD2qe2qBgYZDyc+1Jg+CHf8biy/xllXQQgI2V:suyvDlGoUXZDyc0HCHf2Jxpg
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
11224b24b3619d4ebfe265875f9745fc542553158813aa112d77a0cb4fe654cc.doc .js windows office2003
ThisDocument
Module1