Static task
static1
Behavioral task
behavioral1
Sample
9b1d4574211817f93a0eaf2b9a08c8361af0a5e2e2f68992851280852c7467bb.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9b1d4574211817f93a0eaf2b9a08c8361af0a5e2e2f68992851280852c7467bb.doc
Resource
win10v2004-20220414-en
General
-
Target
9b1d4574211817f93a0eaf2b9a08c8361af0a5e2e2f68992851280852c7467bb
-
Size
44KB
-
MD5
0454bf01bcd7d28404f31d1c1c564e2a
-
SHA1
0e90e9d37f70167e119c8e7ae336e764a27e5748
-
SHA256
9b1d4574211817f93a0eaf2b9a08c8361af0a5e2e2f68992851280852c7467bb
-
SHA512
d6ea20c485bb6e553a1976ddfdd79a0886ad084f26b2160de53aa5b1f5a0cf2cd457322e6e8d1e2cca20dab4d2601d77740244e468ee689271f3b7bd485a43da
-
SSDEEP
384:CxxkV3i4LufajTP2hdb7WoEOiSZfI/PKRTio2WLSRPuV5aYX0jf7t1Ecs:ax8MhAPonLEPufBsW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
9b1d4574211817f93a0eaf2b9a08c8361af0a5e2e2f68992851280852c7467bb.doc windows office2003