Behavioral task
behavioral1
Sample
524df1c2f93720db5d043ca42a718bbc.doc
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
524df1c2f93720db5d043ca42a718bbc.doc
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
524df1c2f93720db5d043ca42a718bbc.doc
-
Size
2.4MB
-
MD5
524df1c2f93720db5d043ca42a718bbc
-
SHA1
885746da1d889ff2f552c3b98c2bc468df33cb85
-
SHA256
c990512977dae3208f5702df31f9fd0f5696937b5160548dd3baeec5b9099128
-
SHA512
fca22095ff42f76ffa3643b2d48d2c0a920e584328227070fe13d734c98b71ebf795a1d0961008b031e01297c3c7132f944cb5c0fb0e6ceadc9ad8ce5a058c7d
-
SSDEEP
24576:BzA26SFmOYac3Il9/eEQdKqEAHifc6PhT7NMWWJ23fKyhFN8SIwjghJRpaF7Eh8N:z/DZIIuy067qHOFIJaD0WQmimPso
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
524df1c2f93720db5d043ca42a718bbc.doc.doc windows office2003
ThisDocument
Module1