Static task
static1
Behavioral task
behavioral1
Sample
2f8e2c8300b7854ff204375f5116854cee7c4ef11f9b080dce89713867fd7066.pps
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2f8e2c8300b7854ff204375f5116854cee7c4ef11f9b080dce89713867fd7066.pps
Resource
win10-en-20211208
General
-
Target
2f8e2c8300b7854ff204375f5116854cee7c4ef11f9b080dce89713867fd7066
-
Size
831KB
-
MD5
6c683aca669e1c448b0abce3df49fcb1
-
SHA1
2c5686beca1f8b111f3a5568681004de526130f6
-
SHA256
2f8e2c8300b7854ff204375f5116854cee7c4ef11f9b080dce89713867fd7066
-
SHA512
30a7b2c804c7b7cf69a99ba7f614b4a4fb1b14ac7683ba1c5e8fad7269d9b3a950fc35eac92045ce1e5d96d399c5ba1f0a4bf6ef39648943cd8f1fd15b8daff6
-
SSDEEP
12288:zUUlqeGea9NbybXZswGfvaite3BXtAkasjzt:zUGFYy2K
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2f8e2c8300b7854ff204375f5116854cee7c4ef11f9b080dce89713867fd7066.pps windows office2003
Module1
Module11
Module2
UserForm1
UserForm2