Behavioral task
behavioral1
Sample
7e26e15cc181d3caec107bfd274e596064eef94dc11b3abde6738b53a0b6cd5b.doc
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
7e26e15cc181d3caec107bfd274e596064eef94dc11b3abde6738b53a0b6cd5b.doc
Resource
win10v2004-20220721-en
General
-
Target
7e26e15cc181d3caec107bfd274e596064eef94dc11b3abde6738b53a0b6cd5b
-
Size
36KB
-
MD5
441e1f32c93a73ea3dd3ad1951867dec
-
SHA1
9daa0fedc53972fce95b11394b8a9ee368c59130
-
SHA256
7e26e15cc181d3caec107bfd274e596064eef94dc11b3abde6738b53a0b6cd5b
-
SHA512
53cde8fc0d98247f9601a812b2fc0943d745e3c6ad9a4dba77a8416d76e02562b2538760c64339df027551c61294f81275c573945e02d730b1cfe30b781be539
-
SSDEEP
384:R0iSbOMKKHK1Oxisp3MN8VFuvRe8p9rSQN0jv1qtu:cKKq1aoC+g8pBSwY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
7e26e15cc181d3caec107bfd274e596064eef94dc11b3abde6738b53a0b6cd5b.doc windows office2003