Behavioral task
behavioral1
Sample
AC-June-7143.mpp
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
AC-June-7143.mpp
Resource
win10v2004-20240426-en
3 signatures
150 seconds
General
-
Target
AC-June-7143.mpp
-
Size
259KB
-
MD5
1e446264aefd35539df31c6045d3f4a8
-
SHA1
d98a9c5993a8afbd9bb9483c7df28ababe57757d
-
SHA256
cb31a1adbc6fa034a3a6563e81ca22a38f84f1889bfa9fcc21c0d2c7e254c508
-
SHA512
ad82caaae41e6423cc44d91a38c3267bb9759d8dfaf6be2ceea0a92d6678280d9167a07f9a3782bf3e2c7b8dcbcf11605e9ac02c3025abe1d8a49092a9bf7312
-
SSDEEP
1536:0KmRXMXBth38LkLZz8i67MV7VijGN9IKAwUFYhMwUFYAUjPaS9VKH:0K0KZ3Nh0ANdAwUFIMwUFFSPaS9VK
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
AC-June-7143.mpp.mpp .doc windows office2003