Behavioral task
behavioral1
Sample
2.doc
Resource
win10v2004-20230220-en
14 signatures
600 seconds
General
-
Target
2.doc
-
Size
178KB
-
MD5
35be4860a6ea917a9f680f5d2faaa2e2
-
SHA1
b388b2219886f871ac9251cf03b20d56d32aa85e
-
SHA256
71d8407e948e2c2a14725196ed1786697e86bbc0cd7f71fd9d35cb13df3b28fd
-
SHA512
827a31f930702712e490507ed77de3bc0c79f1438357bc0650edbdc16cf1d07eca879d90870d755b8112321b97e82e7ab270caf93a17eae4e159225a7abc4318
-
SSDEEP
768:2/MyMo0NKiFFcPHMVkQR3YKbJGxgDxLi4uY/MQufIxLmiLpFenZO67COqUoKRszi:RrF0lS3Gc5U7SzTqRLXDToFtZNu
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2.doc.doc windows office2003
ThisDocument
fomgzipgm