Behavioral task
behavioral1
Sample
5c76feac6590d24a0ea813fa6852a705.vbs
Resource
win7-20231129-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
5c76feac6590d24a0ea813fa6852a705.vbs
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
5c76feac6590d24a0ea813fa6852a705
-
Size
53KB
-
MD5
5c76feac6590d24a0ea813fa6852a705
-
SHA1
49164c934e3a61909c3da0f2d48fcf082b275246
-
SHA256
39a5c2bce8579e66652093b143488794bde7c0ca58fb1b12a61dbd9aa08da881
-
SHA512
7b8c8ab1561bbeb6e3f43437339a5eb665036859b1a6cb1141cccca74d717d72c0ac429c79d0f71e56808df7a8a234c1080c57dcc89322616430dc0e171a310d
-
SSDEEP
384:mRuS9mZ6myFI2fUoiSZfI/PKRzUiZ+bHROZdpxtDTSPgftGxW540NrtyXiXBmFZT:7SU8mmI2fU8APot+4zpxFTSMNpyG6jN
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
5c76feac6590d24a0ea813fa6852a705.doc .vbs windows office2003 polyglot