Behavioral task
behavioral1
Sample
f975eb7996b1524bddb549c5bc8a343205d452cebf152221e58a326df2a7c65e.doc
Resource
win10-20230220-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
f975eb7996b1524bddb549c5bc8a343205d452cebf152221e58a326df2a7c65e.doc
-
Size
283KB
-
MD5
df1ce7ef87ff6936223e000a7191e1bf
-
SHA1
682906a888585316ddadc3a827c24f249670c621
-
SHA256
f975eb7996b1524bddb549c5bc8a343205d452cebf152221e58a326df2a7c65e
-
SHA512
dcf60dc2f7fe2092c83c4634bd2965138fc3213ddf2e5cedb7a7bee8fd59661339b2bf06866b73ddb55ffd6a2e25130af761f708b14e8bbd53d71fd80d549d62
-
SSDEEP
6144:hl96ugeooPHdWUgghO4lip9+PbJgaTOdz:hi5VoPHzDO40gS1dz
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
f975eb7996b1524bddb549c5bc8a343205d452cebf152221e58a326df2a7c65e.doc.doc windows office2003
ThisDocument
Module1