Behavioral task
behavioral1
Sample
204a8346a401f3101361c4571fe1c4bbedc9e54e4f5c181bb7c81cf843286730.doc
Resource
win7-20240221-en
windows7-x64
8 signatures
150 seconds
General
-
Target
204a8346a401f3101361c4571fe1c4bbedc9e54e4f5c181bb7c81cf843286730.doc
-
Size
554KB
-
MD5
c7372d16dc2ed8b7a0ffa8d9f2b6b0f2
-
SHA1
6ed09650439538b2d76ccfc23902416c419eac63
-
SHA256
204a8346a401f3101361c4571fe1c4bbedc9e54e4f5c181bb7c81cf843286730
-
SHA512
7f5d34ed62f89943e7dec3f2df49d6da54fbf9f996d0d3b7554871bb5c2afc60c65830760cb866092092284a9cd38310757ff718010124edaeb07e6e464a5d16
-
SSDEEP
12288:qC79BbmKy2AfG3CQ7nKS9LhS8jWxZIVEs0Rk4q:qW9BbmXGj9LCxaV6q
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
204a8346a401f3101361c4571fe1c4bbedc9e54e4f5c181bb7c81cf843286730.doc.doc windows office2003
ThisDocument
NewMacros