Behavioral task
behavioral1
Sample
c187391b906f5321ccb8aedabebdd0bd.doc
Resource
win7-20240221-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
c187391b906f5321ccb8aedabebdd0bd.doc
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
c187391b906f5321ccb8aedabebdd0bd
-
Size
83KB
-
MD5
c187391b906f5321ccb8aedabebdd0bd
-
SHA1
6041b0e98817728e837d61fc1fd8ff9b98b7c4e0
-
SHA256
97b302bca5e6f78038dc2f170712ee77dc49492117cd6a45612e161cca98249e
-
SHA512
63ede5a05e5908fcec2ee93846e5421bcf81282b6cf485bab860ffbc2bb4b81b15348516786a295b708a18ce3a5d8be109e99afd9a5d98dbb2ba8372e1decef6
-
SSDEEP
768:zDVs3+I/M7u96W0+PPjY30000JMH8QfMJDenNBJj/r+OYIVDELUPPPPPPPPPPPPu:fhGMC8W4k5NDYIVoLtfA6zD
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c187391b906f5321ccb8aedabebdd0bd.doc windows office2003
ThisDocument