Behavioral task
behavioral1
Sample
27fd4e8b72e11357f0a00b5beb964920.doc
Resource
win7-20231215-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
27fd4e8b72e11357f0a00b5beb964920.doc
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
27fd4e8b72e11357f0a00b5beb964920
-
Size
125KB
-
MD5
27fd4e8b72e11357f0a00b5beb964920
-
SHA1
50dafeaa2b75e183661be525fde060782a794ef6
-
SHA256
8e7fb6e2f5cab40baf71083b4406f993d482e945117f146efc9b2aeeb7772625
-
SHA512
68711821417302518b50207b3d3c19b6c68b9063ca5846d16d7cb0b1d7d83b50e941df4df34648c811af103547edd0b83b99f4fe40f9a61ecf88c94cb920987b
-
SSDEEP
768:KhfdrQHFZPSJuKL14mEJc1icjEocMBf0tNE3y6fr/g4MUz6K+NdJquVB8X8dwqx9:e5Aoc2aNgy63M8qNXZVBk8dwOUBRdH
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
27fd4e8b72e11357f0a00b5beb964920.doc windows office2003