Behavioral task
behavioral1
Sample
a9b570e12bf40847bca3ebd6ebe0b0706da53e159012925498ff4003b5f90b7e.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9b570e12bf40847bca3ebd6ebe0b0706da53e159012925498ff4003b5f90b7e.doc
Resource
win10v2004-20220812-en
General
-
Target
a9b570e12bf40847bca3ebd6ebe0b0706da53e159012925498ff4003b5f90b7e.zip
-
Size
19KB
-
MD5
6a770d67558a46b5a8ecefa363904be5
-
SHA1
209b0f536df010cdc2eca5d96c7f02fb118c6a63
-
SHA256
cfbb221c90de9df77b7edda04098543dc41502dfcbd70d237d86e057907041cd
-
SHA512
5a4a7b77f6ccdba0a5a42854bd42fa89ca16f72500b8c9d90447432975c7b0a16b1a39268dae6f89363bfff1220233ccb60c6da128786d2ccb077ee65d5f7804
-
SSDEEP
384:G7NhvulAdvWgN8qre1i4FXS55YCCduuoqbaNCdxGZGXeYQGG7b:G7NxulA/NFr+8Yj8qbXxGZ2eVGG7b
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/a9b570e12bf40847bca3ebd6ebe0b0706da53e159012925498ff4003b5f90b7e office_macro_on_action -
resource static1/unpack001/a9b570e12bf40847bca3ebd6ebe0b0706da53e159012925498ff4003b5f90b7e
Files
-
a9b570e12bf40847bca3ebd6ebe0b0706da53e159012925498ff4003b5f90b7e.zip.zip
Password: infected
-
a9b570e12bf40847bca3ebd6ebe0b0706da53e159012925498ff4003b5f90b7e.doc .vbs windows office2003
ThisDocument