Behavioral task
behavioral1
Sample
cd45b32885be0552c08758bc20d37475.doc
Resource
win7-20240221-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
cd45b32885be0552c08758bc20d37475.doc
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
cd45b32885be0552c08758bc20d37475
-
Size
141KB
-
MD5
cd45b32885be0552c08758bc20d37475
-
SHA1
134c6bf065994e4953b385533a59d12d2782bc02
-
SHA256
f486bb661dc39d13a41a1c0a033aa12f340f37c1f288d10ac245367997b0b063
-
SHA512
d70cf79f75b261ce3d973feb4580508e6787d47c48e69bfbb4a6f0b41ea7d9584a8250b8bd77b588eca9571f596179aac4811155ba4d15878b3c34245fd14a13
-
SSDEEP
1536:x5tG6pAlb9l0g+x+60+e1Wgo1M3KyE0VCVgscRpafEUxIodxpNFWEptZFVV2OB9u:xaXO+dv
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cd45b32885be0552c08758bc20d37475.doc .eml office polyglot
ThisDocument
UserForm1