Behavioral task
behavioral1
Sample
7770b38eb5e7a7ceba40f2ae8767f4e5714e814e4d338fc20062929c068d149f.doc
Resource
win10-20230220-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
7770b38eb5e7a7ceba40f2ae8767f4e5714e814e4d338fc20062929c068d149f.doc
-
Size
231KB
-
MD5
88a6a16bad4db86859538845078f132c
-
SHA1
7d1ee1b7cc321257aeae09676fa27111c90eee2c
-
SHA256
7770b38eb5e7a7ceba40f2ae8767f4e5714e814e4d338fc20062929c068d149f
-
SHA512
1a397dc2ac81d704603ea7ceda392ed060db8e37d44dde0d8a46ed95760cda84190136572774db8dd27bcb82f104f71640a7ebbc52ab2afc58e1dff79e7b4761
-
SSDEEP
3072:ZA+PsTZ4y349tHRZ8N0AV62fEKJ3GApcRrsUvjUwKZXOl:ZPkTmm4PH8N9VVEi3GRrRyK
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
7770b38eb5e7a7ceba40f2ae8767f4e5714e814e4d338fc20062929c068d149f.doc.doc windows office2003
ThisDocument
Module1