Behavioral task
behavioral1
Sample
8694e16966fbae239c4c1789e84b49dc8d220a4aedc3cf5ed50233217dfa370e.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
8694e16966fbae239c4c1789e84b49dc8d220a4aedc3cf5ed50233217dfa370e
-
Size
266KB
-
MD5
05d5a0135a7cf1a2c7f605ca32343498
-
SHA1
bd341da3c68510ff8f597a8e2fd8907f3a72d3e7
-
SHA256
8694e16966fbae239c4c1789e84b49dc8d220a4aedc3cf5ed50233217dfa370e
-
SHA512
67ecc7625cd678d7aba5ef3e98cee5f9b2d07dfde85260f571eec6ad79cf80acf7c5f2fe3aec43ed94c9fbef950270d6ce76d2e3257840208a7bef1811699564
-
SSDEEP
3072:QWuQOQXpp1ixQvZ3WFpAWNHXNxyZro+kir/qz5BSA4JYw2rFK9H:QVQ9CSZ0hNH9xy9xr/Y5sA4ivUZ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
8694e16966fbae239c4c1789e84b49dc8d220a4aedc3cf5ed50233217dfa370e.doc windows office2003
ThisDocument
Module1