Static task
static1
Behavioral task
behavioral1
Sample
f13461cb929fdd13347e61ee6e0fa686e2d196d20b397e4f1a94c1355cc33c78.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f13461cb929fdd13347e61ee6e0fa686e2d196d20b397e4f1a94c1355cc33c78.doc
Resource
win10v2004-20220414-en
General
-
Target
f13461cb929fdd13347e61ee6e0fa686e2d196d20b397e4f1a94c1355cc33c78
-
Size
152KB
-
MD5
0e4a9c1e41152ff1fd39f5c68664473e
-
SHA1
af493165908f1387c65cf90bf3f8b772fbca0c65
-
SHA256
f13461cb929fdd13347e61ee6e0fa686e2d196d20b397e4f1a94c1355cc33c78
-
SHA512
2c21e82c788a955c3beec27c387427a01d8b3ef426b23b43b5560748b0bf62a074731f0b882c19165fd6f29e5229cccd9c01b18901a3f52a64ce237179ace825
-
SSDEEP
3072:WV3En/wPj7T1DwHuZrfaqrw2gJmgTAnYmna:WV3En/Gj7T1DwHY/mMLn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
f13461cb929fdd13347e61ee6e0fa686e2d196d20b397e4f1a94c1355cc33c78.doc windows office2003