Behavioral task
behavioral1
Sample
ab2a81976fe9c16f7d957baad788f50545ec64b74eb726d21f660f17eda7dd44.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab2a81976fe9c16f7d957baad788f50545ec64b74eb726d21f660f17eda7dd44.doc
Resource
win10v2004-20220812-en
General
-
Target
ab2a81976fe9c16f7d957baad788f50545ec64b74eb726d21f660f17eda7dd44
-
Size
47KB
-
MD5
7037a85000bbb38db3a402112ee89ff0
-
SHA1
20de475eebc6c4e4057689b955c794a81a4bcb24
-
SHA256
ab2a81976fe9c16f7d957baad788f50545ec64b74eb726d21f660f17eda7dd44
-
SHA512
0b5a2aaee1780d53cfcf8f2d5fab774911e4caef7e9a6e1e2e9ebd2d62ebaff626a2bc6864dad646de2aafc45ddcab9ac5f859331ac8d0f1d8f7c87f9ff0df7b
-
SSDEEP
768:HI0UOgFl/aX0+DQAPoPxHh7nioDMxz99lUJx0:o0HgFo0+DQAPo/DioDM3IX
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ab2a81976fe9c16f7d957baad788f50545ec64b74eb726d21f660f17eda7dd44.doc windows office2003