Behavioral task
behavioral1
Sample
ff45e8f99091a7c5a40f135f23f46d6705d0e62a0215419eb8846529f5120373.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff45e8f99091a7c5a40f135f23f46d6705d0e62a0215419eb8846529f5120373.doc
Resource
win10v2004-20220812-en
General
-
Target
ff45e8f99091a7c5a40f135f23f46d6705d0e62a0215419eb8846529f5120373
-
Size
246KB
-
MD5
699afa99a698dcab22ae166278d597a0
-
SHA1
2d1c81db9d0c18497f5f3f9d3d33b3024b57c330
-
SHA256
ff45e8f99091a7c5a40f135f23f46d6705d0e62a0215419eb8846529f5120373
-
SHA512
469b14a1aec87e825772602ee45b467ac3e308439dc05c9c90a23e762e1a9f9c358072ef85c66cab8155a3477c893838de369f5227d1a17bf05699cd8482cf19
-
SSDEEP
3072:UFJHXQSau6DHBwQspw7uzeJq+oqZSqftXU5uW:YpChwQawDJhoeSgXD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ff45e8f99091a7c5a40f135f23f46d6705d0e62a0215419eb8846529f5120373.doc windows office2003
ThisDocument
Module1
Module2