Behavioral task
behavioral1
Sample
123ca4e6808c427238533a0893759ff35bc4a23d9404c8ab689b8163cd391a12.msi
Resource
win10-20240404-en
18 signatures
150 seconds
General
-
Target
123ca4e6808c427238533a0893759ff35bc4a23d9404c8ab689b8163cd391a12.msi.MSI
-
Size
232.4MB
-
MD5
61c2833cc970b8640db8d2d43bca6703
-
SHA1
3aca5519f2b336ad6e1a71aaec8053074a33de60
-
SHA256
123ca4e6808c427238533a0893759ff35bc4a23d9404c8ab689b8163cd391a12
-
SHA512
9678f80c2bbd4e5ccf0025750ceaa9bcac5d45232ceb97328b4cc7b916d675cb8650245f036759d56aecf9724664b4881171afc888ee0fea793ed03f06fa07b5
-
SSDEEP
6291456:PRNmz8s0sxvOQzKnjk2y/KdJRZ7nofH9Z2Tvu:hYxWQp2J/DnofH9Y
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
123ca4e6808c427238533a0893759ff35bc4a23d9404c8ab689b8163cd391a12.msi.MSI.msi