Behavioral task
behavioral1
Sample
PI ITS15235.doc
Resource
win7-20241010-en
windows7-x64
14 signatures
150 seconds
Behavioral task
behavioral2
Sample
PI ITS15235.doc
Resource
win10v2004-20241007-en
windows10-2004-x64
13 signatures
150 seconds
General
-
Target
PI ITS15235.doc
-
Size
51KB
-
MD5
1be2a4992097f506fd7ddb85625c2f1e
-
SHA1
f197c2aa2c4c1dd1059d04309b22359d46fec69b
-
SHA256
5573f50bf399a289981af095f020610e04ede3126835312bf7dc4de27f6bb602
-
SHA512
02772db9177dbd1152740078b276b33d3ef79943d6057725da800b7f16af4cda8deb666a42013e8569a36ec4a57739056e496b14c9bb229e01c154c7ea19f5ea
-
SSDEEP
384:Gp0xfMDVBv2xv8R8dFMjNCC4iKncEOqO6tJiSsqdg1vA9tz1/tfxP0jGaHfZtyga:GkUDrMOgPyU+1o9tlt1ha//vOFl
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
PI ITS15235.doc.doc windows office2003
ThisDocument