Behavioral task
behavioral1
Sample
003dc0612e452cefce9f3201b2277708.doc
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
003dc0612e452cefce9f3201b2277708.doc
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
003dc0612e452cefce9f3201b2277708
-
Size
76KB
-
MD5
003dc0612e452cefce9f3201b2277708
-
SHA1
d57511a0dc8b629b6575e1748aa726e5388115c9
-
SHA256
b78200ce3e8f4887b88a7c5dce5b60c9dc9d932c0746a9fcf7e4f80392610f9e
-
SHA512
87d86239e85d506cabf511c36fd44a345d5e4ce596ba25736c4af03dc4ecb6c58c11e174a35ecbbd5fe685f05be4901bf0ca056049d044f1f88b17e39bf412fa
-
SSDEEP
1536:hEDfrpvEJOX+Te5c3dg9qp1cfh05ZStMxGr+Fx8KQvlBXcZKm0g8pyfUHNKNk0+i:hErrpvEJ2+Te5c3dg9qp1cfh05ZStMxV
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
003dc0612e452cefce9f3201b2277708.doc windows office2003