Behavioral task
behavioral1
Sample
a943f6bfcea59de3df3c5cfe269479cb8a9a9678720be9f54c05a52c755ced3c.doc
Resource
win10-20230220-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
a943f6bfcea59de3df3c5cfe269479cb8a9a9678720be9f54c05a52c755ced3c.doc
-
Size
280KB
-
MD5
1ed78c12c4ff7dd9b7107b2b5ec0ddb3
-
SHA1
56282ca3aa2300155a7ef2d125e6df963e9d0354
-
SHA256
a943f6bfcea59de3df3c5cfe269479cb8a9a9678720be9f54c05a52c755ced3c
-
SHA512
c8a3cf440d30e21756c5da7581af3c70b2ed1219126db817750c1a0e558894eb6869a8adedbd49f2587fbd6f6a998a75334a1c325eaa76d434711c48c6e24d21
-
SSDEEP
3072:DRtgb85gk/qpAn0wIQFAN5iRZVGgge3WzN09JYUCJVE4gz7+W9iJF:tNgkHn905e6JkJYUCJV2+iW
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
a943f6bfcea59de3df3c5cfe269479cb8a9a9678720be9f54c05a52c755ced3c.doc.doc windows office2003
ThisDocument
Module1