Behavioral task
behavioral1
Sample
bce4bacd4bfd48307c78b97469c2582ff3fe6b3c7e0e2d9f76038325bccd5f48.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bce4bacd4bfd48307c78b97469c2582ff3fe6b3c7e0e2d9f76038325bccd5f48.doc
Resource
win10v2004-20220901-en
General
-
Target
bce4bacd4bfd48307c78b97469c2582ff3fe6b3c7e0e2d9f76038325bccd5f48
-
Size
64KB
-
MD5
8f7185079f2b9ba7caf6d1b8fd9061ae
-
SHA1
876af82834553680087d298c76ce63aa272c818e
-
SHA256
bce4bacd4bfd48307c78b97469c2582ff3fe6b3c7e0e2d9f76038325bccd5f48
-
SHA512
afefa3eafc4167e96e0109c2dda8f10b7255ec9c1aaa41569f0f386f0aac21321d7fa1bd630744cea107076eb27a001647804f719df3b0ae9277cb916d65f2a7
-
SSDEEP
768:MotXmiz8DiALrxscE+iAPoaEt037UHQAIg8WTipNvNh0:/kiIs0iAPoaEt034vfdTkNw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
bce4bacd4bfd48307c78b97469c2582ff3fe6b3c7e0e2d9f76038325bccd5f48.doc windows office2003