Behavioral task
behavioral1
Sample
208ca06638c442a4f9b82868f7c80635.doc
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
208ca06638c442a4f9b82868f7c80635.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
208ca06638c442a4f9b82868f7c80635
-
Size
17KB
-
MD5
208ca06638c442a4f9b82868f7c80635
-
SHA1
7a50ef44c6104340735f5ce103fa11d93d87da55
-
SHA256
1a36614a4c103f829bb51aaa61fae9d7b01d73fc2ad61388e1fb65b3123e2ce8
-
SHA512
e703e51d925651d3316c212530ca8469e0437085e583b9d04359ea344119f9df2669f5441da38137359e8dc236789fcc28b5e798dcf9c98b82b11d77c68c4ad3
-
SSDEEP
192:SRRX4ORZ3xr+xjG9SNop8iXlo8CEDg16Ca:GZP9SNo11o8CEDg16
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
208ca06638c442a4f9b82868f7c80635.doc windows office2003
ThisDocument