Static task
static1
Behavioral task
behavioral1
Sample
1aca62502efabd340036a0f74f46e03dab633a0d12497b5456590d329fffba6a.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1aca62502efabd340036a0f74f46e03dab633a0d12497b5456590d329fffba6a.doc
Resource
win10v2004-20220414-en
General
-
Target
1aca62502efabd340036a0f74f46e03dab633a0d12497b5456590d329fffba6a
-
Size
40KB
-
MD5
9b7212f54d8460d8144f65d1f644bb13
-
SHA1
3c2eaba89eab872ee549f22f08fdb83e0a34ad99
-
SHA256
1aca62502efabd340036a0f74f46e03dab633a0d12497b5456590d329fffba6a
-
SHA512
a5db7be20fdde31a2f329ce27c60036516cf7e13418bb30a4c66a872d12061b74438dbad25ce461e0424a0eb412035e8001a61624f40d46c29ac69ec4cd2d595
-
SSDEEP
384:LZf2eUfXB9d1nS3XS3kE9kqiS1EHX3DiU1iCNHk+Voifbc60jULZt7h/CV:VuFRXNQKwTX3315tZVocf7L+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
1aca62502efabd340036a0f74f46e03dab633a0d12497b5456590d329fffba6a.doc windows office2003