Behavioral task
behavioral1
Sample
36b121cc48bde1f6c1ac38712f36a17e.doc
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
36b121cc48bde1f6c1ac38712f36a17e.doc
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
36b121cc48bde1f6c1ac38712f36a17e
-
Size
22KB
-
MD5
36b121cc48bde1f6c1ac38712f36a17e
-
SHA1
bd19d2290d18006a038f70fcc9d0ddf6609f2ac9
-
SHA256
6ae3a8c5c3e160c6018e5fbd2febca64f48cc0c431d00d247af0d72a1cf63a0a
-
SHA512
fe8948bffbdff7f4e265fb45f43ed6d06fa2d23199a57c2589f137fca7df1be4126c617e7937f1d01a5f0fa54fb468563b3c6899b2e0f3ecb322d5412f79c0b5
-
SSDEEP
192:/PbzBlW0qgxjDGrya+jODOhkifnrtyDfKi5XbUE/5s5/vD7v0+Ea1G:/P/LbPG2a+jjhk6rsDfKpUoXD7MiG
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
36b121cc48bde1f6c1ac38712f36a17e.doc windows office2003
Class12
Module111
Class3