Behavioral task
behavioral1
Sample
sriksas.doc
Resource
win10-20230220-es
10 signatures
150 seconds
General
-
Target
sriksas.doc
-
Size
40KB
-
MD5
50c9917ca6ad7251557835bf19f43de9
-
SHA1
86ab21c90379ef8ae8eddae952c6ac30a027feda
-
SHA256
2d633da8dcaee6b5a7d6314f0f91405a56f805eb07ab12aca7f8dabf6346ef70
-
SHA512
7cb0b437a01fd2d0aabffb87f5d726aa54a57ca334893aba7fd7b81f9239043645392bfd80dabfe1e8c272f5f124031b7e40f507b833e874a004dbd4824ff9dc
-
SSDEEP
384:sRiShav9M1iOfhP7gjh5khMPCuUjPi6r84Ph4igyOev50jGig3t:sg9Af7gV5K1jPi6J7Ueh5ig
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
sriksas.doc.doc windows office2003
ThisDocument