Static task
static1
Behavioral task
behavioral1
Sample
74a498be10a9d1430a9a00846f271925d54454c4b5d49b724223eaa1a3fe96e8.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
74a498be10a9d1430a9a00846f271925d54454c4b5d49b724223eaa1a3fe96e8.doc
Resource
win10v2004-20220414-en
General
-
Target
74a498be10a9d1430a9a00846f271925d54454c4b5d49b724223eaa1a3fe96e8
-
Size
49KB
-
MD5
d918b4c78cc0d8cc94e452a7158f3ce9
-
SHA1
95a4e6873dc0ebe43fff90b5f869f102d09fe618
-
SHA256
74a498be10a9d1430a9a00846f271925d54454c4b5d49b724223eaa1a3fe96e8
-
SHA512
134d59d79986e1d030aa2f9386dfd21226d991ca7b43d809c393e66513c161772d20e22d828d57df198bd880533427c96115764b45a795d4e5767686d9b24084
-
SSDEEP
384:DbMcoyqo+hFqwnYS9riSZfI/PKRvi22JGeXPEg1uiJ8NhO60j94XLdtE+fes:EcoyqDAPo98PE0IHZqAF
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
74a498be10a9d1430a9a00846f271925d54454c4b5d49b724223eaa1a3fe96e8.doc windows office2003