Static task
static1
Behavioral task
behavioral1
Sample
14ab848a21e4370cbecb5bce9b9233d37aa0d9a02dd7e3aa32fb1ccdf052b07c.doc
Resource
win10-en-20211104
Behavioral task
behavioral2
Sample
14ab848a21e4370cbecb5bce9b9233d37aa0d9a02dd7e3aa32fb1ccdf052b07c.doc
Resource
win10-en-20211014
General
-
Target
14ab848a21e4370cbecb5bce9b9233d37aa0d9a02dd7e3aa32fb1ccdf052b07c
-
Size
82KB
-
MD5
d8cf142293ff0dda1cc5bc5d40804b97
-
SHA1
beacebcca4ba412437b0c6f3c35ec63d0d90b3bd
-
SHA256
14ab848a21e4370cbecb5bce9b9233d37aa0d9a02dd7e3aa32fb1ccdf052b07c
-
SHA512
a2bd79e9ea9760402536d20bf18e64486e54450fd0b9ce0d99ee26000acfd2abcfa1197de2ddc0cd352a8d4c8095e9604d713c55f6bb78cccf320faacf1b9ca8
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource yara_rule sample office_macros
Files
-
14ab848a21e4370cbecb5bce9b9233d37aa0d9a02dd7e3aa32fb1ccdf052b07c.doc windows office2003
jVYtUPcqB
AQniZNf
ErFjwCpzujvROj