Behavioral task
behavioral1
Sample
test_doc.doc
Resource
win7-20240903-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
test_doc.doc
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
test_doc
-
Size
57KB
-
MD5
097ce6bcb9eb36d61d24a99589f94069
-
SHA1
185e0ddc4624c00fdbcfa450f9bae8a68896b163
-
SHA256
10f05ca746c3c53c9df110098a141342b1f8511f7fb3decdc5623731c7e0b2f1
-
SHA512
a191f3e1e561913389427fc31766dab990b6329c6b6bcc7a887de0dde8513625cf0481c26f60d867e710bf4bf64ecbb1d1cd5477e4a38b16f56a5ae05cc19817
-
SSDEEP
768:z35V9wAAL0GgqCAPoZt8f/DdSnJTs/qaIe3/EkJZtk/:T9FAIGrJPoYHDdOJuqav/E
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
test_doc.doc windows office2003