Behavioral task
behavioral1
Sample
cab79999980261bdd1b86ed4c286b529.vbs
Resource
win7-20240221-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
cab79999980261bdd1b86ed4c286b529.vbs
Resource
win10v2004-20240226-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
cab79999980261bdd1b86ed4c286b529
-
Size
59KB
-
MD5
cab79999980261bdd1b86ed4c286b529
-
SHA1
fe292969afb1559e5bc022bdd55abf486f1f4591
-
SHA256
6e545eea71a92b06767bc645cda710640879e6e1cc7ee1e51a77983d77716220
-
SHA512
fa7214fa6ad53b5520b36d0b12574c1455057b9a02041159a2859f60b09a07f810624025f776e88a4a64bc4d403d85d520d60202379325c426a335507c6bce6b
-
SSDEEP
384:YKBrH49mrHwriBhPo9iSZfI/PKRsiKAsSUtw5cYY9tPUYMWKRX0jK1:bb46HwwhPohAPoHsSUePYZmd
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
cab79999980261bdd1b86ed4c286b529.doc .vbs windows office2003 polyglot