Behavioral task
behavioral1
Sample
ccc48baeb95ea607d873b4a0843916c1.doc
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ccc48baeb95ea607d873b4a0843916c1.doc
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
ccc48baeb95ea607d873b4a0843916c1
-
Size
20KB
-
MD5
ccc48baeb95ea607d873b4a0843916c1
-
SHA1
938c9c46f389b1c3f44d50bcdcc79b67a78a7b27
-
SHA256
4155b05b4698721fe8733fefadf4e5ef3c23034d98ad2bbe3b6cba1a0b5d3706
-
SHA512
fa135be8139fbb61b0854f8397e73d88debd9c5c7ac2c5be4edf71e4959e313be598e25b779f306dcf2af1d71076e97a73a1e7c33e5af9f8a33a0d45429837c7
-
SSDEEP
192:I2v146WGcVj5qL+CnAZMtPeNHRZMNsFbxfga0F:Ie1MR9qyCnfPetRa2FbxA
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ccc48baeb95ea607d873b4a0843916c1.doc windows office2003