Behavioral task
behavioral1
Sample
dcb4a3d259430a637ed0b54de85008fbfd288d62ad846450ea89ab60908e18fa.doc
Resource
win10-20230220-en
4 signatures
150 seconds
General
-
Target
dcb4a3d259430a637ed0b54de85008fbfd288d62ad846450ea89ab60908e18fa
-
Size
504.2MB
-
MD5
9ca28b337106a2abcfc09db4a86d48cd
-
SHA1
54e86e9e8355f41a8a6d96ac7eef3473e213037d
-
SHA256
dcb4a3d259430a637ed0b54de85008fbfd288d62ad846450ea89ab60908e18fa
-
SHA512
9559ad3521d03d1bdd689b7889f40018596f108509044d71580716c021e7679684ff13409c848a7a43ffbb292e4d1138b1d3967202ebf827e498a0f75797f7b9
-
SSDEEP
3072:vpt3LDPYvrTr3jvZNWGBStinoLVMcXyHtt5YC7EGIuGEMYDDK6:H3AvrTPRUGpmpXqWCoGIuGEMY
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
dcb4a3d259430a637ed0b54de85008fbfd288d62ad846450ea89ab60908e18fa.doc windows office2003
ThisDocument
Module1