Behavioral task
behavioral1
Sample
7b5b74ed8ca5f213d111ec2fced1f446.doc
Resource
win7-20231129-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
7b5b74ed8ca5f213d111ec2fced1f446.doc
Resource
win10v2004-20231215-en
windows10-2004-x64
15 signatures
150 seconds
General
-
Target
7b5b74ed8ca5f213d111ec2fced1f446
-
Size
623KB
-
MD5
7b5b74ed8ca5f213d111ec2fced1f446
-
SHA1
ba9a35d82106d6c0ce5c50b4861e20c20cacac42
-
SHA256
797fb35ec5ef998f910b1b488a3a394f0d2921e26f1625cd46bfc294800484a4
-
SHA512
4e09f3001c4b8f43f45140e359c61242bd1106bfce527f60813c8a9101213ce0048f3be68d34a3a7289ecd68b900f72c760647b6c702f62c15a580779ea29836
-
SSDEEP
12288:7V9iQsDr8NJEUYfwg8I3HMzNK3Rb+jC4xU4Wht:7VXkr8NWUYhR3HMBK3RMet
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
7b5b74ed8ca5f213d111ec2fced1f446.doc windows office2003
ThisDocument
Module1
Module3
Module123345