Behavioral task
behavioral1
Sample
f52ad46c5e2d06933ee15c41fa36cad03907bca87245c2fffade8d60d3f9e116.doc
Resource
win10-20230220-en
5 signatures
150 seconds
General
-
Target
f52ad46c5e2d06933ee15c41fa36cad03907bca87245c2fffade8d60d3f9e116.doc
-
Size
257KB
-
MD5
c97055c0b94727c7e5cfba1f1b93d222
-
SHA1
b4c08fd778a4a6737228ea4423d91152334ce03b
-
SHA256
f52ad46c5e2d06933ee15c41fa36cad03907bca87245c2fffade8d60d3f9e116
-
SHA512
f6891279bf77562241162640491ee02439c9b4b43c29f1570a1cfb6fa73b2f7cc0e0bd7c709562c223032593349b641bedd5fe32fb9c582fa760309a2516f781
-
SSDEEP
3072:O8oTyroqHD1Ut6WiuBGJnwAkhqX4v23b+thlCN7eyYz2zVQKBfsDl:OMrD1C/l8Ivke7CVRK3l
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f52ad46c5e2d06933ee15c41fa36cad03907bca87245c2fffade8d60d3f9e116.doc.doc windows office2003
ThisDocument
Module1