Behavioral task
behavioral1
Sample
0af9feef501519dcb9c451a0e004f82a.doc
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0af9feef501519dcb9c451a0e004f82a.doc
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
0af9feef501519dcb9c451a0e004f82a
-
Size
14KB
-
MD5
0af9feef501519dcb9c451a0e004f82a
-
SHA1
a781886c8d4d1ef8358bddf099c7a8fcae999244
-
SHA256
bf055b48de89a5bd01b8d0a738005f5b4d16ef2281cd70f5ce4cdcd33948c759
-
SHA512
9777136ca89bfab40a8feb7bf6abab8059ce88bb60077b681e4273ba6aa7d4bc6036984a7bdeba5f4487278c07e94108cf04dbc362c4947d9770117f6245d463
-
SSDEEP
96:cp74Se8jU3xl4Pi3qoR8AdgRFexmHuUmh5EwBlcr90hkG+uVLFhNvkicn7DtVcz6:b1pHD8HFpEJsu5nvkxV/yCOj7hZa
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0af9feef501519dcb9c451a0e004f82a.doc windows office2003