Behavioral task
behavioral1
Sample
1bd22f9c-7823-414e-afb0-21a9f7dd716f.doc
Resource
win7-20230831-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
1bd22f9c-7823-414e-afb0-21a9f7dd716f.doc
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
1bd22f9c-7823-414e-afb0-21a9f7dd716f.doc
-
Size
220KB
-
MD5
670404d4c5468e927013c48b4c869707
-
SHA1
c025923a9f2b0abcbc3f3441afe1e5826c9b67d8
-
SHA256
1f82df84d2eff274ca96260af68d2f4c056f5f54f7279a7f384d33e09088d641
-
SHA512
9d213ca9365167b92df3304060322053e83acb33767b0b65425fa7a917287b958c8b97e1cd8cc9beebee4891c40263078dccd784783b868c9c18a5d5c2ad89d1
-
SSDEEP
3072:uJRZnZD2qmeocGqScj6tqeJKbzB1FtDLQSQPpNaZ09o:IRZV2d/cDaCDLQ1XaZ0G
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1bd22f9c-7823-414e-afb0-21a9f7dd716f.doc.doc windows office2003
ThisDocument
Module1
Module2
Module3
Module4
UserForm3
UserForm1