Behavioral task
behavioral1
Sample
Note.doc
Resource
win7-20240221-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Note.doc
Resource
win10v2004-20240226-en
7 signatures
150 seconds
General
-
Target
720a06e64e4fb85ff82dd2f225789a46b58303399b12b8390bbd3bdc4d5c5774
-
Size
1.0MB
-
MD5
a7a30d88c84ff7abe373fa41c9f52422
-
SHA1
796810df98d4dead88f8cbe379af556621d819c1
-
SHA256
720a06e64e4fb85ff82dd2f225789a46b58303399b12b8390bbd3bdc4d5c5774
-
SHA512
72d3b8294d40a8dc7d6f9ec572c15a4f3b94fe32bdf4f10301ce30fda86dc86aba2741d7e3018091eab97d918e36bb1f82a2185180f5a473bfc0c9791440f960
-
SSDEEP
24576:kLXMRmPRIScwYMyBX82WJZ7T9XZpjmjZ1tpZ8OrMzk:IcRUINdqxzZXZMXZ/r7
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/Note.doc office_macro_on_action -
resource static1/unpack001/Note.doc
Files
-
720a06e64e4fb85ff82dd2f225789a46b58303399b12b8390bbd3bdc4d5c5774.rar
-
Note.doc.doc .eml office polyglot
ThisDocument