Behavioral task
behavioral1
Sample
7f120ba802e1972db4166a781294a5a4.doc
Resource
win7-20231129-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
7f120ba802e1972db4166a781294a5a4.doc
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
7f120ba802e1972db4166a781294a5a4
-
Size
576KB
-
MD5
7f120ba802e1972db4166a781294a5a4
-
SHA1
fbec3c99ee2cf8bf5c8f92e89e88a9012f3a53cb
-
SHA256
7f357817d93a435441f54c46a1a877846a879310289df93636ca26d02b9c548c
-
SHA512
9ee387902c2e52f1c5f99b45851ee739921f62664f28e80d1807426d8a11e62206ad9b70793ea17e4c5ea7db7b67e06e4ad8413261d5e4ca609ca14a41b5a333
-
SSDEEP
6144:TUiABstkyzwfkYFYZqUZJrpX8hoAOALi/NaZpd2xoifoTvT+4MkINH6eGKtU3ZM6:TUFBstk6YFGqp2UAjVkn9pNxxfXj
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7f120ba802e1972db4166a781294a5a4.doc windows office2003