Behavioral task
behavioral1
Sample
c8a08352d6eb12d36d60ead2940baf32146bd2fe584a9a8bffba42fd3b70a441.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c8a08352d6eb12d36d60ead2940baf32146bd2fe584a9a8bffba42fd3b70a441.doc
Resource
win10v2004-20220901-en
General
-
Target
c8a08352d6eb12d36d60ead2940baf32146bd2fe584a9a8bffba42fd3b70a441
-
Size
42KB
-
MD5
67ce02ee6cb128d65bbdaa8eb5f7655a
-
SHA1
ed9ac6f79c09dda693638525c366fd1771efe380
-
SHA256
c8a08352d6eb12d36d60ead2940baf32146bd2fe584a9a8bffba42fd3b70a441
-
SHA512
1591f436fce04536295d926bbf9e6367b57ee974905906ed978508d34e34c220a227a3225842b6dd34db337e8a1abacb3387b8d035dfc490b07415e8681cd936
-
SSDEEP
192:BaQOaKcftoUsCMa4sMtv6/6rNjiP1CQkYiq6rhLih4tVUqG8PK0ZwgILbtyWbH1a:BLOe1s5iSeCQLQpmtqbPROLbtyc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
c8a08352d6eb12d36d60ead2940baf32146bd2fe584a9a8bffba42fd3b70a441.doc windows office2003