Behavioral task
behavioral1
Sample
85c05d0a5d83254cf21d5fb675778c2728a2534ad8b04ff0ea0eb8be1a4aaab2.doc
Resource
win7-20241010-en
12 signatures
60 seconds
General
-
Target
85c05d0a5d83254cf21d5fb675778c2728a2534ad8b04ff0ea0eb8be1a4aaab2
-
Size
60KB
-
MD5
e6ad8f2aae70a48ac22722a9eec31626
-
SHA1
d348381ba3412722b16120ff091346b81575e4ba
-
SHA256
85c05d0a5d83254cf21d5fb675778c2728a2534ad8b04ff0ea0eb8be1a4aaab2
-
SHA512
8abe4cdde92020b735abf743cd19e3973a7df26b14e2540d106c1daa5f1cbb6934294cabe35f2caa922c4ea7c35c9670fe396d8b308c82642070f26513702488
-
SSDEEP
768:xqqqqm8jNkxD6LI7+qCGtyCwzktphJmNQxfqBlC2x:xqqqqm8jNyoI7+qCGgkgBlC
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
85c05d0a5d83254cf21d5fb675778c2728a2534ad8b04ff0ea0eb8be1a4aaab2.doc windows office2003
ThisDocument
tmpD1B9