Behavioral task
behavioral1
Sample
084c717946dac70208356946767f4e3588bfbb6b16e254fce1048008a11b23bf.doc
Resource
win10-20230220-en
5 signatures
150 seconds
General
-
Target
084c717946dac70208356946767f4e3588bfbb6b16e254fce1048008a11b23bf
-
Size
508.2MB
-
MD5
117344e1228af9d5f9c4dc79bf537ecb
-
SHA1
a509b13529c2725943df631ab4f4f6413aa065c5
-
SHA256
084c717946dac70208356946767f4e3588bfbb6b16e254fce1048008a11b23bf
-
SHA512
0d5d211c087c432b6677da73d9716668c5e8fe8b49825bdf6dba81179c521bc51ccf4d133bd3c99bc05a8546bdc7d12bbb6bbc57c69aa830e024380553d38185
-
SSDEEP
3072:eoEW2aOtFjH0lP2IpjctfRcVVwEi/A8NVM1wIOCbX6bYLjWFJuvx7ueK6:ZE1aOtFa2I9c3aVw4zwxCbJ4Jup
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
084c717946dac70208356946767f4e3588bfbb6b16e254fce1048008a11b23bf.doc windows office2003
ThisDocument
Module1