Behavioral task
behavioral1
Sample
a911f15452f15df957ea762b5141b3a9eb59a2b5288cff97d1f4ba2c1dfcecfb.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a911f15452f15df957ea762b5141b3a9eb59a2b5288cff97d1f4ba2c1dfcecfb.doc
Resource
win10v2004-20220812-en
General
-
Target
a911f15452f15df957ea762b5141b3a9eb59a2b5288cff97d1f4ba2c1dfcecfb
-
Size
217KB
-
MD5
4b571a4478b6d1c0e1f5140ec5025b00
-
SHA1
86370be377de651b0ccfd4e62a37ab8138856a81
-
SHA256
a911f15452f15df957ea762b5141b3a9eb59a2b5288cff97d1f4ba2c1dfcecfb
-
SHA512
0169c18e190f229a5be12951d305e8d2b8d46bce917624e4ac7ca2b2e44c0db0de4d6e3f11b547c19abd6c0b5bb08c73c7ee663c16cf7982ca68576193a77164
-
SSDEEP
3072:ioMcG2+gDQxljJrfLulbiHY4+aN6M90puQLuSx7D+lWszJlo+:LG2+gDQxxJjSpDa79yuQLSl3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a911f15452f15df957ea762b5141b3a9eb59a2b5288cff97d1f4ba2c1dfcecfb.doc windows office2003
ThisDocument
Module1
Module2