Behavioral task
behavioral1
Sample
7d2b21bdb347c439af731ff5c9b783cd35447d0104494a6a4abdd66a0083ee1d.doc
Resource
win10-20230220-en
5 signatures
150 seconds
General
-
Target
7d2b21bdb347c439af731ff5c9b783cd35447d0104494a6a4abdd66a0083ee1d
-
Size
538.8MB
-
MD5
7faf2908c02fb9b846bb957c28e737d9
-
SHA1
783a5fe8e08439ce3b09b1cb63c7bbe67c05fbb1
-
SHA256
7d2b21bdb347c439af731ff5c9b783cd35447d0104494a6a4abdd66a0083ee1d
-
SHA512
be169ecdef35f31195cfbb99a70aea32972c10a02e1302ff2443a01cf53b002500694232e6b79685464f4cfa72e12be3f59c65424a9a4dd6021f8cfc223c0119
-
SSDEEP
12288:XxYDQ8EW+Ba+qKYR08a72L2X0dMzPPqvBUEu3uNsRAPYwT4q3MJ/d:2DPElaSUqqafj9Q4ZJ/d
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
7d2b21bdb347c439af731ff5c9b783cd35447d0104494a6a4abdd66a0083ee1d.doc windows office2003
ThisDocument
Module1