Behavioral task
behavioral1
Sample
application2.doc
Resource
win10-20231020-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
application2.doc
Resource
win10v2004-20231023-en
4 signatures
150 seconds
General
-
Target
application2.doc
-
Size
140KB
-
MD5
125bfa0fc0fdaa1b7f137412a7f6b2e3
-
SHA1
2b0fd384f75493f6df2c194f2ddf4fb7e985b557
-
SHA256
41ee7670a8445217a48a2cbfe733681915e73d7f7f5d0c685b499092283cda4b
-
SHA512
a533e2b7d7256d19506a5650017f51cc0590b483b9ae6611588e1f35548e48d3a05334f8084eb790e13fed2d22249bdf2e8905e4c9ea523839a2d143a0163640
-
SSDEEP
1536:yCBHipBWnX2Vyvtm0slFxE1YLvB9kiy1naHHsleUFPWh0Z/CVanFI6uEMhGy11qd:zi34mAtaF8YLviCHytWh5760hxkV
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
application2.doc.doc windows office2003
ThisDocument
NewMacros