Behavioral task
behavioral1
Sample
7f3d7bb90ce53b5ed6923362ac2b5b44.vbs
Resource
win7-20231129-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
7f3d7bb90ce53b5ed6923362ac2b5b44.vbs
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
7f3d7bb90ce53b5ed6923362ac2b5b44
-
Size
46KB
-
MD5
7f3d7bb90ce53b5ed6923362ac2b5b44
-
SHA1
3823b7ca8efd6f5473beee9e1e96f58b81625582
-
SHA256
16bdb09e4463d101d99f5147f430d840fa25c2d44dc308a8b31831eb1fe7e632
-
SHA512
98266995444f4a3de528a13b53e12ce871a19d9445bb680df764a8563a29049bc29306bdc472e56c872d6a1a7d0d02a5ef8e54116c97f643cf4e8b28fc22046c
-
SSDEEP
384:ORQPdp+4sCI8iSZfI/PKRBHSKBGgnSX0jMQtR:OR2p+4yIAPoBSKX8v2
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7f3d7bb90ce53b5ed6923362ac2b5b44.doc .vbs windows office2003 polyglot