Behavioral task
behavioral1
Sample
4302bf2881c2ede737ae438fb4427f01.doc
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
4302bf2881c2ede737ae438fb4427f01.doc
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
4302bf2881c2ede737ae438fb4427f01
-
Size
431KB
-
MD5
4302bf2881c2ede737ae438fb4427f01
-
SHA1
a24199b5c55e2b8c35186d9d6189f36d15540bae
-
SHA256
643aac263025e8b90c9458a56508d49624e504c0dbf20bdc06f7630cf89d9035
-
SHA512
42c9f44fd937773ba546dfb11cbae0b77aad5615b8f2bb3c92c04cc30567c51f7f19549baa3ad88637808753b39ded6d283e884e1091e9bab4de4f5a93114a8d
-
SSDEEP
12288:ZV9iQsDr8NqClDfKTFi1w06/vbOes1AOrk4U:ZVXkr8NTNfKB30AOesoT
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4302bf2881c2ede737ae438fb4427f01.doc windows office2003
ThisDocument
Module1
Module3
Module123345