Behavioral task
behavioral1
Sample
khaosat_trieuchung.doc_1
Resource
win7-20231023-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
khaosat_trieuchung.doc_1
Resource
win10v2004-20231023-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
khaosat_trieuchung.doc_1
-
Size
43KB
-
MD5
167949ba90da85c8b56878d95be19c1a
-
SHA1
d9d0e6f1f0d368d77897c784faf73019b36fbbe9
-
SHA256
9cafe1ff820182f2d33d662bc3b4018caf27c49d50242573f9620f06001c582f
-
SHA512
cfe9a3179f2ad7c1ad401fafaa8cc8d043cb994513d57e2e01c2b4133b4d0d3636ffa2af5b017d16fe044a97331832af10f40c06c2eebb47332915a74293be6d
-
SSDEEP
384:r+ql8iSUR/8dQwn+zmkYEbMGceEfzbm2ue0n0g5mrLI7aRBZy0jJxAtt:6qT/qMmkYUhEbyVe00g5mrLQaR6
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
khaosat_trieuchung.doc_1.doc .doc_1 windows office2003
ThisDocument
NewMacros