Behavioral task
behavioral1
Sample
be3e9bd3f58a2b848c0f65fe7632746bc8cf74d813791b0cf5a00acb1bff9819.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be3e9bd3f58a2b848c0f65fe7632746bc8cf74d813791b0cf5a00acb1bff9819.doc
Resource
win10v2004-20220812-en
General
-
Target
be3e9bd3f58a2b848c0f65fe7632746bc8cf74d813791b0cf5a00acb1bff9819
-
Size
111KB
-
MD5
67528ce85cd4db3718ba389c6b8e1750
-
SHA1
906061925e9ad2b0da9dc2bb5901a8c0acb3d098
-
SHA256
be3e9bd3f58a2b848c0f65fe7632746bc8cf74d813791b0cf5a00acb1bff9819
-
SHA512
c0ef60057160b22272aeb3908fde6ebfd79afcd21a8939af1b8f263047dae0e75c6b488a669cc080393c7445b359710856e4f4508f273bfc9c4f5f0f85de51ed
-
SSDEEP
3072:cuFXGA+zdk8N9a8WVDEL5EpKqZJZcNw1j/agrtx:b2/RN9a25OK2JaNwZiytx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
be3e9bd3f58a2b848c0f65fe7632746bc8cf74d813791b0cf5a00acb1bff9819.doc windows office2003
ThisDocument
Module1
Module2
Module3