Behavioral task
behavioral1
Sample
06870463d9a00b05839e7e8de379702aefccc47cf48b0b511c76da2cb8c13e50.pps
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
06870463d9a00b05839e7e8de379702aefccc47cf48b0b511c76da2cb8c13e50.pps
Resource
win10v2004-20220812-en
General
-
Target
06870463d9a00b05839e7e8de379702aefccc47cf48b0b511c76da2cb8c13e50
-
Size
248KB
-
MD5
3cd6fc1309294e4eb4bfb2e861e2f570
-
SHA1
706cedeba3d7b1e7eddb7462e90a5a51238679fa
-
SHA256
06870463d9a00b05839e7e8de379702aefccc47cf48b0b511c76da2cb8c13e50
-
SHA512
a2bbd7ec9de0040ab8c945a21792b3f3481961ce058b17f3d2b07589571dfb8bf3692df7913aeb832b05abcbef6e8e02b027f9101aba23ad71b1160bc8c9041d
-
SSDEEP
6144:QAL0xwOHqiAGESPyTmhKoBUYKfDxOd2v1QytKEzg8lSIK7IBZZEwAAoD:Qs
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
06870463d9a00b05839e7e8de379702aefccc47cf48b0b511c76da2cb8c13e50.pps windows office2003
Module1