Behavioral task
behavioral1
Sample
ef4f00ef898af4684313869d9a68fe96701e3341e5f94172374800484f9d6f25.doc
Resource
win10-20230220-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
ef4f00ef898af4684313869d9a68fe96701e3341e5f94172374800484f9d6f25.doc
-
Size
253KB
-
MD5
703517ce071eb9ed6d831ff06319a1d5
-
SHA1
2e3481ba985e4e6f82714c4723e02b90814db812
-
SHA256
ef4f00ef898af4684313869d9a68fe96701e3341e5f94172374800484f9d6f25
-
SHA512
bba9ba78c3c12918f0f8bbc5d73f680e78baa5505487a3d00e9bd104855fa253016c50282391013e9f80231ce227b120fa2d32aab6bdfec687c5a2022e071219
-
SSDEEP
3072:Gw2e6pQqKpXdEbwde5lgfOiqeNn1+o/x0Q6aUmDSKSNLnIiPf8xMwH99P:GwmXoClPzKp0Q6aUmWKSNTIiPkxPH9
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
ef4f00ef898af4684313869d9a68fe96701e3341e5f94172374800484f9d6f25.doc.doc windows office2003
ThisDocument
Module1