Static task
static1
Behavioral task
behavioral1
Sample
0172bec4d945add9f12ce4d7d23f0e0da1ced677e89bfc132b000d444876cb41.doc
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0172bec4d945add9f12ce4d7d23f0e0da1ced677e89bfc132b000d444876cb41.doc
Resource
win10-en-20211208
General
-
Target
0172bec4d945add9f12ce4d7d23f0e0da1ced677e89bfc132b000d444876cb41
-
Size
566KB
-
MD5
cbfae579a25df1e2fe0e02934efd65dc
-
SHA1
54c987ddc4e08defe2cee3882a2b729d55aef3ce
-
SHA256
0172bec4d945add9f12ce4d7d23f0e0da1ced677e89bfc132b000d444876cb41
-
SHA512
d9df94d65771ac9a136f30bd4d8fc359bda057ea92a4da476f38df2976460a55b3afdb445ff873f71b34ed43f6b0954f0e16e202ff48f59e47bc36b1e736eb9f
-
SSDEEP
3072:HjCOgfOUFiRmXYo31n66oOgfOUFiRmXYo3162RL:Hj2ZVfwZVB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
0172bec4d945add9f12ce4d7d23f0e0da1ced677e89bfc132b000d444876cb41.doc windows office2003
ThisDocument
Module1
UserForm1
UserForm2