Behavioral task
behavioral1
Sample
AC-June-7387.mpp
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
1-1.eml
-
Size
78KB
-
MD5
c38366483f50e3326031cd58e49be60a
-
SHA1
bc666e55737f32569cd348bbb2c6e8fff09fe035
-
SHA256
613064159ab231399cff019a2a0f5880d2de93fb28a9beaa6903d962bf5bed1d
-
SHA512
cda2de240a58146b9c062015981885d11bbebbef5a0ac4920096f750e841096a1fc30389d7f9b0d04d15c2295663b729c73aeaaad0f26a9f71c6ff37c26e39b2
-
SSDEEP
1536:FfUuluLrLlge9oe+IwT/UHoRqI6WIfE9QkyPm/ZFuzPgsVQ0YTpO9FoeYhrSx:FcSfsiQ/GbyP+gPEDsUax
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack002/AC-June-7387.mpp office_macro_on_action
Files
-
1-1.eml.eml
-
AC-June-7387.zip.zip
-
AC-June-7387.mpp.mpp .doc windows office2003
-
email-html-2.txt
-
email-plain-1.txt