Behavioral task
behavioral1
Sample
c6a955feba1b9e85859176043a1a274c.doc
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
c6a955feba1b9e85859176043a1a274c.doc
Resource
win10v2004-20240226-en
windows10-2004-x64
15 signatures
150 seconds
General
-
Target
c6a955feba1b9e85859176043a1a274c
-
Size
539KB
-
MD5
c6a955feba1b9e85859176043a1a274c
-
SHA1
31e397116cb4a2ec8188f9b51c0b980389031689
-
SHA256
25b1a6b2d713499b4d483d782626ff8f8622bfa1b078a6641d2efbe615db1ffd
-
SHA512
8c06e70f6b85011f82ef45fc9f605722b4a6037aea8340482dbafd68bbd647a69fbd028fbb9cbf69f7b4250de65013cb76a8c082af746b67f7d68d47a56451bf
-
SSDEEP
12288:hV9iQsDr8NQhqNrdjqLCV8L/EnqO1BKI9vIOaCuQByhC1A5/U:hVXkr8NpNrAmqL/EnJ1BsrPzhN5M
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c6a955feba1b9e85859176043a1a274c.doc windows office2003
ThisDocument
Module1
Module3