Static task
static1
Behavioral task
behavioral1
Sample
85b3f137a1982946d87baa0ba6e06d79ba7d79560e99469842249f7c4f7179fb.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
85b3f137a1982946d87baa0ba6e06d79ba7d79560e99469842249f7c4f7179fb.doc
Resource
win10v2004-20220414-en
General
-
Target
85b3f137a1982946d87baa0ba6e06d79ba7d79560e99469842249f7c4f7179fb
-
Size
11KB
-
MD5
f4fc7719242c3670869af29d3e846515
-
SHA1
11514d4d4863977e7817bc9bd205eb69d49c4183
-
SHA256
85b3f137a1982946d87baa0ba6e06d79ba7d79560e99469842249f7c4f7179fb
-
SHA512
611e9aec55ad86627f4924e73bbb43b3c4233cdb16b4f955a5bb47d622c1b941704841f6470c1a5d76d09f973dce533052ca25d44d26d43bd83bf41e153a903f
-
SSDEEP
192:BZO8LxrfCtRPWf/n35Z0jx7izAt37gMa:PO+k4/nJZ0jx7izAt3E
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
85b3f137a1982946d87baa0ba6e06d79ba7d79560e99469842249f7c4f7179fb.doc windows office2003