Behavioral task
behavioral1
Sample
0dc8fbd7fdf0dd3b4217bbc8d4308ed3.doc
Resource
win7-20231215-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
0dc8fbd7fdf0dd3b4217bbc8d4308ed3.doc
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
0dc8fbd7fdf0dd3b4217bbc8d4308ed3
-
Size
73KB
-
MD5
0dc8fbd7fdf0dd3b4217bbc8d4308ed3
-
SHA1
76e90324ce39aa99de66b9c1063715b66bd40898
-
SHA256
19f886f8d37179f55fc53d421b679b196d0502386ce28ceb37989144831def8d
-
SHA512
6328d89ce5aba6a124ddbc08a64cbff2626a8e082de17be686d21ceb03ded981c86afeba061b05570cbfef56c6e5809c88b8eacaad9844aa785cef21e93f65c4
-
SSDEEP
384:h6VYMOFKfzVSv63VxR+ESk+EKUuyIrmNMGq3/VAj2OnZn8FwUZ77wZ3hvxUFS/KO:NCNMGq3/lZNqlDyhQKbIOnnz/ceyfpc
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0dc8fbd7fdf0dd3b4217bbc8d4308ed3.doc windows office2003