Behavioral task
behavioral1
Sample
f1e86634aef586b525383efb8145ccffecebd3b3c24c9f5e259aaa28aa073e69.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f1e86634aef586b525383efb8145ccffecebd3b3c24c9f5e259aaa28aa073e69.doc
Resource
win10v2004-20220901-en
General
-
Target
f1e86634aef586b525383efb8145ccffecebd3b3c24c9f5e259aaa28aa073e69
-
Size
171KB
-
MD5
63541ea6224b4642428cd12aaa76d1a0
-
SHA1
2e8d35be1a8977353154cbbc96b5339a22762e84
-
SHA256
f1e86634aef586b525383efb8145ccffecebd3b3c24c9f5e259aaa28aa073e69
-
SHA512
07e1d3a233eab39ec110d381f424f87d72e7682f40f7f22984a0ef16f242857c50dfd3309d4cf7295c4f0117a368a0257b0c8e545eef0aa8da9387a7c68f291a
-
SSDEEP
3072:JSl0fJpY23ndu0SJXZDRiv/E0S+FpM95EgtttttUS+Z0oHQlM:JSlkjY23nc0CFiv/XFFpy3tttttlESM
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f1e86634aef586b525383efb8145ccffecebd3b3c24c9f5e259aaa28aa073e69.doc windows office2003
ThisDocument
Module1
Module2