Behavioral task
behavioral1
Sample
53a0177376a77a326faff38d768c0e373120e558b72719340ff557ce28034567.doc
Resource
win10-20230220-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
53a0177376a77a326faff38d768c0e373120e558b72719340ff557ce28034567.doc
-
Size
232KB
-
MD5
49a307bb3ccce451737f2d6ba035efcf
-
SHA1
7b2c5658f14b2999d4d2de3108a1ffeb04f0d899
-
SHA256
53a0177376a77a326faff38d768c0e373120e558b72719340ff557ce28034567
-
SHA512
a43c6578ffe7bedee0b3461e501a3490b9051a0891c7a119ce99820e826cb9b1e6658be9939923b8d00c3db2a73e86ffaebe59f42219ef1402988707bfa09e0c
-
SSDEEP
3072:3C4JpR+K9y3LtqjsW5rQWm65BxPiP0wjEwRzpswUSkCI1ev2+6ssXR:nD7435u5aWmyBxK3MCI1ev2+6V
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
53a0177376a77a326faff38d768c0e373120e558b72719340ff557ce28034567.doc.doc windows office2003
ThisDocument
Module1