Behavioral task
behavioral1
Sample
aa1f5d627b6cfb20931df3e28076863b.doc
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
aa1f5d627b6cfb20931df3e28076863b.doc
Resource
win10v2004-20240226-en
11 signatures
150 seconds
General
-
Target
aa1f5d627b6cfb20931df3e28076863b
-
Size
539KB
-
MD5
aa1f5d627b6cfb20931df3e28076863b
-
SHA1
2573a06ce8014caeab2dcf8eb538ceb18a3c3bd7
-
SHA256
dcf86cd8c74b124a830d18865defb1aed8b8874861db625d1e8b10d57a19fcce
-
SHA512
2495d7bd29598a1eadbc66f5c45a2f528c59fb7b37215cbddde9ab89384a6639bff37eec5eaf85f95ccd96a687fc62cd4e0ee8020af98fd80b4640850fdabe24
-
SSDEEP
12288:kV9iQsDr8NnhqNrdjqLCV8L/EnqO1BKI9vIOaCuQByhC1A5vT:kVXkr8N4NrAmqL/EnJ1BsrPzhN5b
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
aa1f5d627b6cfb20931df3e28076863b.doc windows office2003
ThisDocument
Module1
Module3