Behavioral task
behavioral1
Sample
f0aece5fba0bd22c4307a053b944bc27d8e851c8ca5dd03cac3637a18b8dc8eb.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f0aece5fba0bd22c4307a053b944bc27d8e851c8ca5dd03cac3637a18b8dc8eb.doc
Resource
win10v2004-20220812-en
General
-
Target
f0aece5fba0bd22c4307a053b944bc27d8e851c8ca5dd03cac3637a18b8dc8eb.zip
-
Size
14KB
-
MD5
f7d1c3705110692028b23d99f9234eb6
-
SHA1
657c7f3924f24d8575e69e901ff199546b54d8ce
-
SHA256
ef6edae4af58782bdc35783bb96d12804e5cf4671e9a2341bc2f3a5258eaff2e
-
SHA512
11fec3aa9f9ab981fc1196dcd2f68f59265d479745fd42ff40adb668cc8071507aaa6c1aeb8b3a61ae96b5d585ea001daaf44eb05506efa18b99e45f8377925b
-
SSDEEP
384:K1xxOvd/hYAJJksYBa2YM8jY5X68kHWhQ7BaYHi88o3QIqfiwQ:8xMpYxs928jY5q8kyQ7Ba9Lo35N
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/f0aece5fba0bd22c4307a053b944bc27d8e851c8ca5dd03cac3637a18b8dc8eb office_macro_on_action -
resource static1/unpack001/f0aece5fba0bd22c4307a053b944bc27d8e851c8ca5dd03cac3637a18b8dc8eb
Files
-
f0aece5fba0bd22c4307a053b944bc27d8e851c8ca5dd03cac3637a18b8dc8eb.zip.zip
Password: infected
-
f0aece5fba0bd22c4307a053b944bc27d8e851c8ca5dd03cac3637a18b8dc8eb.doc windows office2003
ThisDocument
Module1
Module2