Behavioral task
behavioral1
Sample
de9fafdc650919674f57e8f2b4430946.doc
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
de9fafdc650919674f57e8f2b4430946.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
de9fafdc650919674f57e8f2b4430946
-
Size
12KB
-
MD5
de9fafdc650919674f57e8f2b4430946
-
SHA1
1aabd676bea7da7f4a624d9c946d2371c28800a7
-
SHA256
23215d442c6bcb3a4c60ed92b879d79c69659867e2477e0bf41e7712175147aa
-
SHA512
0c8d6877cb1da21ac47b3727d4d0750497773b230d838291a3ae263454418bc1131f466f40bd13abc3225f8ce297750849cf4d50eae525e9529c9446cbabcda0
-
SSDEEP
192:7oxeeOETbHWfNDzZZfvOlF6EDg16PKbG:FETb2fNXZtIF6EDg16C
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
de9fafdc650919674f57e8f2b4430946.doc windows office2003
ThisDocument