Behavioral task
behavioral1
Sample
632fd12bde5970402ad44c47964a38ea.doc
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
632fd12bde5970402ad44c47964a38ea.doc
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
632fd12bde5970402ad44c47964a38ea.bin
-
Size
290KB
-
MD5
632fd12bde5970402ad44c47964a38ea
-
SHA1
4660966973896459b262ee829a7ff81665b3958b
-
SHA256
a715eb5ce9ebef16036dae851a62c8dd16c187e0c48576ae6dcd298872f55c36
-
SHA512
c6b80a1e7aff0280659d620a9b8929f6de7600b5f849ffa4a341033d73079eb6caf12de426f8ef2c22673244e0caaeb9d848d093f6d590307d6a95eb7c5dbf34
-
SSDEEP
3072:n9nytLPk8keiNKeWoGjtEID4fd4WIFgwR7mTFA02105VCM7agqCpnUgm:UtjzkKjtEIDCsSTFt2wVCaagqCRUgm
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
632fd12bde5970402ad44c47964a38ea.bin.doc windows office2003
ThisDocument