Behavioral task
behavioral1
Sample
a495c963a54756a726e20e10514e185ced903f6d06c19f3a9a7a0f99dbc55235.doc
Resource
win7-20240221-en
7 signatures
150 seconds
General
-
Target
a495c963a54756a726e20e10514e185ced903f6d06c19f3a9a7a0f99dbc55235
-
Size
111KB
-
MD5
dff3d8f56aa76d6ec3e0947c27e5be8f
-
SHA1
b7464bf5e98b31b8ad6e531c7bf826ecd26758f5
-
SHA256
a495c963a54756a726e20e10514e185ced903f6d06c19f3a9a7a0f99dbc55235
-
SHA512
720e9f9bde1af8d01f469df807eb8c0101dfa2d5a3ef719ea199af9ccea1eb8a8f238a741dde4212604ca3f996437f0e01b9c9b783208bd6e488deec6fbf9ca8
-
SSDEEP
1536:UBCfFUA89Zr0MilIUltNy2Bx0MH/6ksMngRqWBIC0iPWHgzJOX3++0fVH05ScMJ9:EGjl1xnsAyt5O9kvJ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a495c963a54756a726e20e10514e185ced903f6d06c19f3a9a7a0f99dbc55235.doc windows office2003
ThisDocument
Module1