Behavioral task
behavioral1
Sample
c286bfa4a741ae1dfc7ae7176cb74166074510ec77835ee072b192d6bebae5f1.doc
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
c286bfa4a741ae1dfc7ae7176cb74166074510ec77835ee072b192d6bebae5f1.doc
Resource
win10v2004-20220721-en
General
-
Target
c286bfa4a741ae1dfc7ae7176cb74166074510ec77835ee072b192d6bebae5f1
-
Size
267KB
-
MD5
6609a251a692535a12a083f30c43681f
-
SHA1
b5161effceeb06ee45aa1f52ac16fe716e0e2ea3
-
SHA256
c286bfa4a741ae1dfc7ae7176cb74166074510ec77835ee072b192d6bebae5f1
-
SHA512
bc2d7cd31d5b6fca690558e37859ac31022cfaf95d729bcf97b24c636a26a4714540adfbd8d1acacae53c7d22df7e292f602dabe9193acc8fc513e2d40174ce2
-
SSDEEP
3072:w0gPv0gPqJDRqHgIhqRQfMS7G4UB4IsspevHfXgvoUXIakRdIvNMpiz6xPOSrSEU:opqhRqHg/aN7GjsspevHf8fkklTzGU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
c286bfa4a741ae1dfc7ae7176cb74166074510ec77835ee072b192d6bebae5f1.doc windows office2003
ThisDocument
BHyVRi3NE
Aowr74
d3ugvO
fx