Behavioral task
behavioral1
Sample
b7356be125c2e1726ea61322a0e3f923.doc
Resource
win7-20240221-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
b7356be125c2e1726ea61322a0e3f923.doc
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
b7356be125c2e1726ea61322a0e3f923
-
Size
82KB
-
MD5
b7356be125c2e1726ea61322a0e3f923
-
SHA1
80089c86ca108a9738a546e036bea153ee7ab148
-
SHA256
7f52c2b9f6b83fb167bd4d75168d4289ef0733d0a45ec45be5c489149146ac70
-
SHA512
15d1b5c2b067ca947898f7eb2a69e8bb6c86930d1327f2f4da37b5aca3584d576ce4da5e73100b32b653bde891d3bf852d0042a9a6d9a9e3a3b2e3ffa7a20c6e
-
SSDEEP
1536:g0P4/VvSmhNQYy6H3F2dIHnAe4hNoAPoKa9:g0P4/VaynbLATzoAq
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b7356be125c2e1726ea61322a0e3f923.doc windows office2003