Behavioral task
behavioral1
Sample
79e4c52f25b8e4dcccb0be4173c20a8e.doc
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
79e4c52f25b8e4dcccb0be4173c20a8e.doc
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
79e4c52f25b8e4dcccb0be4173c20a8e
-
Size
20KB
-
MD5
79e4c52f25b8e4dcccb0be4173c20a8e
-
SHA1
da20644e236e99fd5e6c0bae07639a54d1c85879
-
SHA256
abe147fa029f0fea14f2e6a02add922570ca66425db21d631006cd089c1faaa4
-
SHA512
6d0c06ebfe4c40cb042cf9ee260329227bf49ef2a7f0340a7a5274002de3e25bd150906e210399478ce538ba0f7572b79f6e16c47376296d51a08cad597b2ece
-
SSDEEP
192:BNv146Wo3Vj5qL+CnAzmPedHRZMJqo5bxfga0/:BV1Mol9qyCnnPedRaIo5bxi
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
79e4c52f25b8e4dcccb0be4173c20a8e.doc windows office2003