Behavioral task
behavioral1
Sample
runner.doc
Resource
win10-20231020-en
4 signatures
1200 seconds
General
-
Target
runner.doc
-
Size
21KB
-
MD5
d8cc82a6e1de1c8b4548c9c61283f2ee
-
SHA1
85c0f3e4cab1b13f1bc233da6cbc01327f81e6ee
-
SHA256
b3720afa10751b13fe303c2ec6da77612effc0b0c540526fd30d7ea069c47045
-
SHA512
ec7d733ec07a19fb5e3e84df91c11de11b8e842584b6d26fdff7236525ea43a99a2121177b9bec04869a0d46ee35fc696e251fbdfcc86c9af344c79898e6030c
-
SSDEEP
384:oTR/jsnwuyHeijOiWDl50jWOtnHkFeFa+Bq:O7ObD32HkFeFa+Bq
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
runner.doc.doc windows office2003
ThisDocument
NewMacros