Behavioral task
behavioral1
Sample
8d62e279fb5323f1b4df1d873b4653fb.doc
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
8d62e279fb5323f1b4df1d873b4653fb.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
8d62e279fb5323f1b4df1d873b4653fb
-
Size
13KB
-
MD5
8d62e279fb5323f1b4df1d873b4653fb
-
SHA1
3fd57470ca0e67bc6e8a45e26d14b73246cd4633
-
SHA256
0b2b14cb5617ea71da4c0a9dac99d9ed8947edce8a8a304e572a9e2d29e4f05f
-
SHA512
b74bcbcb1648550f0eb45bbdb74e4f641913e3bc0ed5b23892223890b765928c5618965605c77e84c49f46571dd951e4dcbdef0c580d4043c90e842ff71d4549
-
SSDEEP
192:pdqE8m7Xrc04xPOXSN0jbQgTLQtBRs+Dik66MCDknqa:bUxmSN0jbQgHQtDck66VD
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
8d62e279fb5323f1b4df1d873b4653fb.doc windows office2003
ThisDocument