Behavioral task
behavioral1
Sample
cd74ac7872958ee4136eddacd7a02d84a13f92e687194c642fc78e7d7eebca27.doc
Resource
win10-20230220-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
cd74ac7872958ee4136eddacd7a02d84a13f92e687194c642fc78e7d7eebca27.doc
-
Size
210KB
-
MD5
99cc7ce1004f774c88ee12844574069a
-
SHA1
8fb289af5ea4eb8cb7954c73a97773ea58a300b0
-
SHA256
cd74ac7872958ee4136eddacd7a02d84a13f92e687194c642fc78e7d7eebca27
-
SHA512
94aa0e34398488eced20eee6aa41986922a02dacb10021e1f78dcc33056bc51fed2a50dca1b93799dfbd2243f64bf8435f4d386b145cc7309744e3210a414a45
-
SSDEEP
3072:i2/9vOwF/LycxYLGBTkuNic15SRyQORiJAcktIUicq+KgPKIxwk:lRvxYLsTXNic15StvHXEKgiIxwk
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
cd74ac7872958ee4136eddacd7a02d84a13f92e687194c642fc78e7d7eebca27.doc.doc windows office2003
ThisDocument
Module1