Static task
static1
Behavioral task
behavioral1
Sample
967f8ce36c47d7f80da8c768bf6119484eb9883cf3743490a628770609379b7b.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
967f8ce36c47d7f80da8c768bf6119484eb9883cf3743490a628770609379b7b.doc
Resource
win10v2004-20220414-en
General
-
Target
967f8ce36c47d7f80da8c768bf6119484eb9883cf3743490a628770609379b7b
-
Size
13KB
-
MD5
a5a53d89ff770b51ce94578222d14a8d
-
SHA1
ccadd75200efc601b58a6bb4bb6f0b76d1f11e24
-
SHA256
967f8ce36c47d7f80da8c768bf6119484eb9883cf3743490a628770609379b7b
-
SHA512
f777265f37895fb36a6a69d91b7341d5ff6692ca3f884d4ae416b9b12f42655bd6433c933fc108fe834ae4184f67f911a991a51d7f8d03c8df1b43f024ba1764
-
SSDEEP
96:Jyo1JUN6xPM8lAOcl1vH9NEa0j2OgO3xlMoAeElKfG+X0j3Tuw22ahi1otQ5uILZ:J/1J9M8lkHBPLlKZ0jjhrmtGLDqa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
967f8ce36c47d7f80da8c768bf6119484eb9883cf3743490a628770609379b7b.doc windows office2003
ThisDocument