Behavioral task
behavioral1
Sample
db31651d3fecebad7a86f07d10028af4ff4cc200f5bd861a869a0c33e0b925eb.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db31651d3fecebad7a86f07d10028af4ff4cc200f5bd861a869a0c33e0b925eb.doc
Resource
win10v2004-20220812-en
General
-
Target
db31651d3fecebad7a86f07d10028af4ff4cc200f5bd861a869a0c33e0b925eb
-
Size
211KB
-
MD5
67cf6d538c5886d6f795d90561a71300
-
SHA1
c8661a306be66092f312fddcf184a96f9328b649
-
SHA256
db31651d3fecebad7a86f07d10028af4ff4cc200f5bd861a869a0c33e0b925eb
-
SHA512
9f264cb2aae0c67328d88be0c1614a46465eae5f356bb5874ecb5d1cc514799de042cbc02a5fe33f15240470a508610f65e1ffcede8bde65d1318c1bd7ddaab4
-
SSDEEP
3072:P8hSMjJrfLulbiHY4+aN6M90puQLuSx7D+lWszwlm+:P8hSuJjSpDa79yuQLSlc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
db31651d3fecebad7a86f07d10028af4ff4cc200f5bd861a869a0c33e0b925eb.doc windows office2003
ThisDocument
Module1
Module2