Behavioral task
behavioral1
Sample
1002ba5a61f889dc94295a0db3fc0754.doc
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1002ba5a61f889dc94295a0db3fc0754.doc
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
1002ba5a61f889dc94295a0db3fc0754
-
Size
75KB
-
MD5
1002ba5a61f889dc94295a0db3fc0754
-
SHA1
52622b025b7bab376839dac704f81f58d90ec5d1
-
SHA256
44b79297cabb07e7e0d8cb3e48b2aa95669479e7ab8da22c898335a3ca9f9eca
-
SHA512
7b809c88a904ca7010554a2fb69731bfc8d7b2b1694eba96fe21b5ba095599f1aa39ed96fb9d31a899f0abe259f4439a2e43a889879004ab07c31823b8366f76
-
SSDEEP
768:CoWiKxoqQx24pRsPMhsS9DWhqixw+d5hYeKaAPozjJRbbb2wacXysAKtL:CoWiRqQx6usS9aJxwAYaAPoRRbl
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1002ba5a61f889dc94295a0db3fc0754.doc windows office2003