Behavioral task
behavioral1
Sample
2653a1d23f195b42db80a10ebe3ca6d4.doc
Resource
win7-20240704-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
2653a1d23f195b42db80a10ebe3ca6d4.doc
Resource
win10v2004-20240704-en
5 signatures
150 seconds
General
-
Target
2653a1d23f195b42db80a10ebe3ca6d4.bin
-
Size
235KB
-
MD5
2653a1d23f195b42db80a10ebe3ca6d4
-
SHA1
5bbccc77be9733de10c1e5faae761c286385ff08
-
SHA256
8dc29c02ede7a978d77cdc023fcaea5fbc72d7cee5070b0bccdb0149c6a9e23d
-
SHA512
9cf8183bbe08df13aca8b922a73cf07bfb1639cce527974bb41fa39f4f7a858687342894dc43d988eee219c4eb085b0ed087779bcae4fa4ddf5ee2e0e2ac2aae
-
SSDEEP
1536:HterihwjEu5s1mermyzrKXhbloHrTPQy9K/dRYwcKibB5abHa1AUoneVK+:H/wjd5s1mermyHKxuYdSfKiTaDaONm
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2653a1d23f195b42db80a10ebe3ca6d4.bin.doc .eml office polyglot
ThisDocument
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5