Static task
static1
Behavioral task
behavioral1
Sample
5c439ee5c576e91bb895f4afdfeb45db9a56a4b098cd1b759de8ca682ff0a18d.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5c439ee5c576e91bb895f4afdfeb45db9a56a4b098cd1b759de8ca682ff0a18d.doc
Resource
win10v2004-20220414-en
General
-
Target
5c439ee5c576e91bb895f4afdfeb45db9a56a4b098cd1b759de8ca682ff0a18d
-
Size
120KB
-
MD5
d0457ebc025980b7fa0daf5db6b47fe2
-
SHA1
eebf75380cbd4be34ae890f703e0511d4b450b90
-
SHA256
5c439ee5c576e91bb895f4afdfeb45db9a56a4b098cd1b759de8ca682ff0a18d
-
SHA512
d09b261491f6bbc4de250c6fdf7fc4eb5b25e44381037c80da068741f20f8bcb2bede410449b792194194a8140c0868caa6de098cd7f1dd046c50b7b9d8cc7d6
-
SSDEEP
1536:GZoXkaB/hyd50+tkLIw5VYfrTaeG8nZE1JLr0D7L3Mq5/TOGa50:3kaBhYwI2Yfaefu1Rq5/qn50
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
5c439ee5c576e91bb895f4afdfeb45db9a56a4b098cd1b759de8ca682ff0a18d.doc windows office2003
ThisDocument