Behavioral task
behavioral1
Sample
1AdSZGtAumuH4695.doc
Resource
win7-20230220-en
8 signatures
1800 seconds
Behavioral task
behavioral2
Sample
1AdSZGtAumuH4695.doc
Resource
win10-20230220-en
5 signatures
1800 seconds
General
-
Target
1AdSZGtAumuH4695.doc
-
Size
12.0MB
-
MD5
c227d388b5104f82e6cae1dff1bb5e78
-
SHA1
d9c0344d92cff868210a381eb831921ea2563013
-
SHA256
fba289e6c411a2ff483ae447ecc2d2fd2cf1fab21c83af7a86f221c602742af8
-
SHA512
cf87090bd83e6dbdaf1df4438922b488c223dcaff65087831ce29ad9a2318d6d73c0c01e00bfa26086bd82d11dd55ea8c8282e00a8b2f7ae10882e99dbfbf253
-
SSDEEP
3072:eoEW2aOtFjH0lP2IpjctfRcVVwEi/A8NVM1wIOCbX6bYLjWFJuvx7ueK6:ZE1aOtFa2I9c3aVw4zwxCbJ4Jup
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1AdSZGtAumuH4695.doc.doc windows office2003
ThisDocument
Module1