Static task
static1
Behavioral task
behavioral1
Sample
04ae3026fc9502f115794757e29bef4a6ad6cf3047fb7b444b0ddbed9504c631.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
04ae3026fc9502f115794757e29bef4a6ad6cf3047fb7b444b0ddbed9504c631.doc
Resource
win10v2004-20220414-en
General
-
Target
04ae3026fc9502f115794757e29bef4a6ad6cf3047fb7b444b0ddbed9504c631
-
Size
126KB
-
MD5
ffd7ed2ea278afe39daf3b7f6d4819d3
-
SHA1
e7245488c6048d3a4bb0c7a49cacc1f2145330fb
-
SHA256
04ae3026fc9502f115794757e29bef4a6ad6cf3047fb7b444b0ddbed9504c631
-
SHA512
59ea97a02a17c1fe21b30dae6ebe206798943f9a8b245686420e33ac2da46f647000a67e2208eb2f63e4f7a32a7c0c76de65312dd7f9895fc74776e31468c726
-
SSDEEP
3072:A8GhDS0o9zTGOZD6EbzCd3WiWCAWcWvfxa:eoUOZDlbe3WiWCAWcWvfxa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
04ae3026fc9502f115794757e29bef4a6ad6cf3047fb7b444b0ddbed9504c631.doc windows office2003
HXbEGlvJu