Behavioral task
behavioral1
Sample
fb74b1eb454fddb41011ae5b3f343589bf49d4be7e8ced6cbc25d6e9191bd862.doc
Resource
win10-20230220-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
fb74b1eb454fddb41011ae5b3f343589bf49d4be7e8ced6cbc25d6e9191bd862
-
Size
538.3MB
-
MD5
57a46489f02c106569f8cd62ba9f7501
-
SHA1
abb1400ec57cef7d625324261f29e0b226b9cd5b
-
SHA256
fb74b1eb454fddb41011ae5b3f343589bf49d4be7e8ced6cbc25d6e9191bd862
-
SHA512
46be9131984820c098888849357a34c9004058e7fd057c2e4b57cbc717133e0fcb45a331954d091019e6661bb1c6d0595cf7bbbcac66e178c0bf4af92456f296
-
SSDEEP
3072:2JX29m8QBUoItA/leC6gSJ+2JiclnUOvrRxqmLcHeNJxPkdVdTRcDK6:2EmleC6gSJWclU0RxVLcHe5cdTR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
fb74b1eb454fddb41011ae5b3f343589bf49d4be7e8ced6cbc25d6e9191bd862.doc windows office2003
ThisDocument
Module1