Behavioral task
behavioral1
Sample
718670be0f4bcad07a606772ab9b0893.doc
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
718670be0f4bcad07a606772ab9b0893.doc
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
718670be0f4bcad07a606772ab9b0893
-
Size
11KB
-
MD5
718670be0f4bcad07a606772ab9b0893
-
SHA1
cf1107cd821b621f0dd069157c220b68441a2f91
-
SHA256
710f14712c05b33da29b1d101eddf2c8f93dd61cde51ec95d2125190d4c56f42
-
SHA512
3960b65169f3916371973578abcd7be0760a6a81ad70dd84b3c3fccdcb35e89d8934d74dc0abadddf2978056dd748b2ccb0e6193cb39184925e68e1e762e66fd
-
SSDEEP
96:cS8gURQEMBGXFbZFv2XGwOJ2Jl/1vnR+30jca2otLWNjtG5uInkYQLuFausiSv:bwXFbu25Wn+0jDJxOtUnWaajv
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
718670be0f4bcad07a606772ab9b0893.doc windows office2003