Behavioral task
behavioral1
Sample
c4cd826570f4c4af1c87aca7d4ca160a9922e0f8b8e37aebc6d8e26e183ae7b5.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4cd826570f4c4af1c87aca7d4ca160a9922e0f8b8e37aebc6d8e26e183ae7b5.doc
Resource
win10v2004-20220901-en
General
-
Target
c4cd826570f4c4af1c87aca7d4ca160a9922e0f8b8e37aebc6d8e26e183ae7b5
-
Size
222KB
-
MD5
6f71daa74feeecf28fb54ac04e351880
-
SHA1
5fa9955a87c918b0e9852c234a48af042ae07c2b
-
SHA256
c4cd826570f4c4af1c87aca7d4ca160a9922e0f8b8e37aebc6d8e26e183ae7b5
-
SHA512
314d5f2f09c6fa04a5d1acc57ccb69e851da0995b53711c52982dcada157d7a36f483cc548f62d7db30c71a436134206a1a2e513a2b0334a8bb440794f2c9ea6
-
SSDEEP
3072:psL7pBEOymjJrfLulbiHY4+aN6M90puQLuSx7D+lWszrel3+:psz3fJjSpDa79yuQLSljZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c4cd826570f4c4af1c87aca7d4ca160a9922e0f8b8e37aebc6d8e26e183ae7b5.doc windows office2003
ThisDocument
Module1
Module2