Behavioral task
behavioral1
Sample
bed9b82437186bf3f4c35ef2d328c905.doc
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
bed9b82437186bf3f4c35ef2d328c905.doc
Resource
win10v2004-20240226-en
11 signatures
150 seconds
General
-
Target
bed9b82437186bf3f4c35ef2d328c905
-
Size
539KB
-
MD5
bed9b82437186bf3f4c35ef2d328c905
-
SHA1
a85327cddf1d837b863e445600b0cb5d8cf42ccc
-
SHA256
ae4054dadd7aabb10eb6fdb521b6c9969065cb71bdd4ebf22e57ce36279358c6
-
SHA512
46c52958d8b55d1dd8acc9cc3d79f504db14a2e70156fb054f3733cb771d8358c4d2f744497d1260f8bc6c9f6b83613dbaae83482f78a1b86ea53258ef24fdd8
-
SSDEEP
12288:jV9iQsDr8NyhqNrdjqLCV8L/EnqO1BKI9vIOaCuQByhC1A5fU:jVXkr8NfNrAmqL/EnJ1BsrPzhN5s
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bed9b82437186bf3f4c35ef2d328c905.doc windows office2003
ThisDocument
Module1
Module3