Behavioral task
behavioral1
Sample
73106f313477a63e61c3738a18e4478bcb6f0dd82defa59be4546c0b09369b93.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73106f313477a63e61c3738a18e4478bcb6f0dd82defa59be4546c0b09369b93.doc
Resource
win10v2004-20220901-en
General
-
Target
73106f313477a63e61c3738a18e4478bcb6f0dd82defa59be4546c0b09369b93
-
Size
198KB
-
MD5
587e01c12c9c4894f176ca26bf55c0c0
-
SHA1
fb4e484fc924a56d8feb6ad27e0a9863c364d959
-
SHA256
73106f313477a63e61c3738a18e4478bcb6f0dd82defa59be4546c0b09369b93
-
SHA512
e2b4033ce1755fe6cf7f26cccb021e8a2220d4eb277b7f6e229d2abb7ea84290433b8c8e76269bc6c9a06079938b2bbe82f77c477fadaf5ce009428583f7675c
-
SSDEEP
1536:Yb2VHaHtW9wM4dVjJKaZMySsGLstlqsR9CJ66rsfgYcG:Yb2IHE9wnVjJK6Uilh8JqYYc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
73106f313477a63e61c3738a18e4478bcb6f0dd82defa59be4546c0b09369b93.doc windows office2003
ThisDocument
Module1
Module2