Behavioral task
behavioral1
Sample
6fe419396223d5d2bfe81403acf1a6eb21b954c9fad36dc9e22ff43270409ffa.doc
Resource
win10-20230220-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
6fe419396223d5d2bfe81403acf1a6eb21b954c9fad36dc9e22ff43270409ffa.doc
-
Size
300KB
-
MD5
eb138f165e8ed2c17e2655d3e555e485
-
SHA1
1876b62a1a713a4c5e185486900aacb8049f4c39
-
SHA256
6fe419396223d5d2bfe81403acf1a6eb21b954c9fad36dc9e22ff43270409ffa
-
SHA512
c44947c1d48ba72e2577935d9b3be2dd8cec178672bfce8d4e95fc4742c12e9e8c8ebb8dad74d9767712bbc0ef16c14a1a24dec9f84136e6a7a60793a5903c34
-
SSDEEP
3072:eoEW2aOtFjH0lP2IpjctfRcVVwEi/A8NVM1wIOCbX6bYLjWFJuvx7ueK6:ZE1aOtFa2I9c3aVw4zwxCbJ4Jup
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
6fe419396223d5d2bfe81403acf1a6eb21b954c9fad36dc9e22ff43270409ffa.doc.doc windows office2003
ThisDocument
Module1