Behavioral task
behavioral1
Sample
8be6ba8309c792d6180b097ef98e99b5e1640608de0dc8282b84ffbfba0d69a9.doc
Resource
win10-20230220-en
5 signatures
150 seconds
General
-
Target
8be6ba8309c792d6180b097ef98e99b5e1640608de0dc8282b84ffbfba0d69a9
-
Size
517.3MB
-
MD5
f97cf90c62ab6b98a0310a09673080fe
-
SHA1
1c9326dae03c5e9cf6cce79f38bab2238c9f135e
-
SHA256
8be6ba8309c792d6180b097ef98e99b5e1640608de0dc8282b84ffbfba0d69a9
-
SHA512
02bebeb0f7870f7ea06e3d4c449fc2c7f1bb85b0088e128296dbe2e5f54573f3ea4901cdd1fe775b7fc5dd1784c011af4be95701d01fa79a56256725e1b4228c
-
SSDEEP
6144:QDuxuMOZCBtANveapnaWVgsaNlbfXhoEHC87pnkTnlzIWZ4:18yGZZak8fxJB1e5IWZ4
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8be6ba8309c792d6180b097ef98e99b5e1640608de0dc8282b84ffbfba0d69a9.doc windows office2003
ThisDocument
Module1