MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1362bd550b6bce1a99388bbb4a8eccfe085f7a38770a502701b3c064c0a1f461. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 17


Intelligence 17 IOCs YARA 2 File information Comments

SHA256 hash: 1362bd550b6bce1a99388bbb4a8eccfe085f7a38770a502701b3c064c0a1f461
SHA3-384 hash: 7c6c83e5c413ebe16b1c8c1b4221cee21ec1b2ce18784df9a14c7cf641df5910eb33f9cab6cdba48f8866f0ce1bd3464
SHA1 hash: c098628d67d654175f787f0d9deb626ab0ce4a13
MD5 hash: 62620d4c521ae2e04e9a7d5c8b4aebe5
humanhash: crazy-island-carbon-twelve
File name:1362bd550b6bce1a99388bbb4a8eccfe085f7a38770a502701b3c064c0a1f461.doc
Download: download sample
File size:219'136 bytes
First seen:2025-12-23 15:09:45 UTC
Last seen:Never
File type:Word file doc
MIME type:application/msword
ssdeep 1536:BfyxBmwhG3zvz8SCw+4gCUJs9MPanNQoJPBO1b8C5yqtgMIUMdb1K8L+pzD4/o1s:J0BmwhG3Dx+PJ78My8IMJlEgp6Z7
TLSH T191246C8CF15AE489DD486ABD4A0983DB3B684E299EF4345A36177B7C1D730F1C0096FA
TrID 52.6% (.DOC) Microsoft Word document (30000/1/2)
33.3% (.DOC) Microsoft Word document (old ver.) (19000/1/2)
14.0% (.) Generic OLE2 / Multistream Compound (8000/1)
Magika doc
Reporter JAMESWT_WT
Tags:doc hlsofficeaam

Intelligence


File Origin
# of uploads :
1
# of downloads :
78
Origin country :
IT IT
Vendor Threat Intelligence
Malware configuration found for:
MSO
Details
MSO
extracted VBA Macros and, if observed, MS-OFORM variables/data are added to the knowledge base for usage in later parsing of the Macros
Malware family:
n/a
ID:
1
File name:
2026년_1차_보안교육_프로그램_안내.doc
Verdict:
Suspicious activity
Analysis date:
2025-12-20 07:17:30 UTC
Tags:
macros macros-on-open

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Legit
File type:
application/msword
Has a screenshot:
False
Contains macros:
False
Verdict:
Malicious
Score:
93.3%
Tags:
office macro micro
Result
Verdict:
Malicious
File Type:
Legacy Word File with Macro
Behaviour
BlacklistAPI detected
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
evasive macros macros-on-open
Label:
Malicious
Suspicious Score:
10/10
Score Malicious:
1%
Score Benign:
0%
Result
Verdict:
MALICIOUS
Details
Suspicious Document Variables
Detected a macro that references a suspicious number of tersely named variables.
Long Time Delay
Detected a macro with a suspiciously long wait time, potentially to evade sandboxes.
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
Macro with DLL Reference
Detected macro logic that will load additional functionality from Dynamically Linked Libraries (DLLs). While not explicitly malicious, this is a common tactic for accessing APIs that are not otherwised exposed via Visual Basic for Applications (VBA).
Verdict:
Malicious
File Type:
doc
First seen:
2025-12-20T00:18:00Z UTC
Last seen:
2025-12-20T06:38:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan.Script.Generic Trojan.MSOffice.SAgent.sb Trojan-Dropper.MSOffice.SDrop.sb HEUR:Trojan-Dropper.Script.Generic
Verdict:
Malware
YARA:
6 match(es)
Tags:
Blacklist VBA Corrupted Office Document
Verdict:
Malicious
Threat:
Trojan-Dropper.MSOffice.SDrop
Threat name:
Document-Word.Trojan.Chartres
Status:
Malicious
First seen:
2025-12-21 05:31:00 UTC
File Type:
Document
Extracted files:
22
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
macro macro_on_action
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Process spawned suspicious child process
Loads dropped DLL
Verdict:
Suspicious
Tags:
maldoc
YARA:
Office_AutoOpen_Macro
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:informational_win_ole_protected
Author:Jeff White (karttoon@gmail.com) @noottrak
Description:Identify OLE Project protection within documents.
Rule name:Office_AutoOpen_Macro
Author:Florian Roth (Nextron Systems)
Description:Detects an Microsoft Office file that contains the AutoOpen Macro function

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments