Behavioral task
behavioral1
Sample
2023-03-08_1446.doc
Resource
win7-20230220-en
windows7-x64
12 signatures
150 seconds
General
-
Target
a.doc
-
Size
668KB
-
MD5
52621843b501bb2c0eac09632185c92f
-
SHA1
a7617593f49b98364c5ea0e77c0722bb8ec3b074
-
SHA256
e95ba579b0dfa53f6ead74db1f61cea1287639cea0567823b3f4e1c77be8e983
-
SHA512
ac9398e87f9e96a46c7e9976aa9cfaff5ce8ab2468afef43b49102025a9972a7cd07302f689a985d99f34b228d5802f841f5eeb8630fb1b5548d9ebfa63a5495
-
SSDEEP
6144:wJNbwmfcuHom8Hz2f//ywiWT8xVTI5wq4:UbPHom8TYyCT8x5I5wB
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/2023-03-08_1446.doc office_macro_on_action -
Processes:
resource static1/unpack001/2023-03-08_1446.doc
Files
-
a.doc.zip
-
2023-03-08_1446.doc.doc windows office2003
ThisDocument
Module1