Behavioral task
behavioral1
Sample
504368519288583f7d6b6981c641b4b9509bdee7aac1e0d6c2371fc952451392.doc
Resource
win10v2004-20250314-en
5 signatures
600 seconds
General
-
Target
504368519288583f7d6b6981c641b4b9509bdee7aac1e0d6c2371fc952451392.zip
-
Size
118KB
-
MD5
b856331357666c2ccd812c00a84b76dc
-
SHA1
8ed8e16c36b75b08fe19d038c86e0cbc66569b3d
-
SHA256
28be1bcfd275756888fe4e1e2d866d7af521022f9a13e0267778e63e8ae98aa7
-
SHA512
697c8c01d4795434e3ba9246c1264f457081ba95522a74d8d060f448ab5c11930005c535418bb54221ba1e7b1169528f0983d5447387fc38d6577b2d6483c8ce
-
SSDEEP
3072:t0COxZUalxAXXpRnBB1ItAcN03ge66b0HmWILq9C:t0Rbh4RStAv376l0
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/504368519288583f7d6b6981c641b4b9509bdee7aac1e0d6c2371fc952451392.doc office_macro_on_action -
resource static1/unpack001/504368519288583f7d6b6981c641b4b9509bdee7aac1e0d6c2371fc952451392.doc
Files
-
504368519288583f7d6b6981c641b4b9509bdee7aac1e0d6c2371fc952451392.zip.zip
Password: infected
-
504368519288583f7d6b6981c641b4b9509bdee7aac1e0d6c2371fc952451392.doc.doc windows office2003
ThisDocument