Behavioral task
behavioral1
Sample
ppt/KJHGuygiYYiuiutiYTIUiriury.doc
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ppt/KJHGuygiYYiuiutiYTIUiriury.doc
Resource
win10v2004-20240221-en
4 signatures
150 seconds
General
-
Target
a1389870c283b0caca7bb2021c51c26a
-
Size
7KB
-
MD5
a1389870c283b0caca7bb2021c51c26a
-
SHA1
32580c214fc59d1efe456019bba30310637beb61
-
SHA256
9e2c3760b545ca0fec4d7f2b12fc8f97307385239d6c355a1fa2e326f3153997
-
SHA512
5a2ef1deb8947771bf727fad0c649f72113d571725785e2590993e2bb8c317b067191af67c6de57114dbcedf9019b28ae116268786785ec2c81fd3b730280bea
-
SSDEEP
192:A2gtqbdabsEYNFzvuXzkAFqFxOBwoQX0rthwSo7UWFQEe:ANtqbDE8zWDCiyo5rt+7WEe
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/ppt/KJHGuygiYYiuiutiYTIUiriury.bin office_macro_on_action
Files
-
a1389870c283b0caca7bb2021c51c26a.zip
-
[Content_Types].xml.xml
-
_rels/.rels.xml
-
ppt/KJHGuygiYYiuiutiYTIUiriury.bin.doc windows office2003
-
ppt/_rels/HGKhgkjgUUoiuyoYTIUT.xml.rels.xml