Behavioral task
behavioral1
Sample
5418bbd0ba034145e57fc11733740463f383d32c7abee07bf1f8870b2ec9c999.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5418bbd0ba034145e57fc11733740463f383d32c7abee07bf1f8870b2ec9c999.doc
Resource
win10v2004-20220812-en
General
-
Target
5418bbd0ba034145e57fc11733740463f383d32c7abee07bf1f8870b2ec9c999
-
Size
112KB
-
MD5
4a0cab45e190a94792175afa2aad54c0
-
SHA1
3fdab0c96e5131df4ac69c11424e0ba0fba867b5
-
SHA256
5418bbd0ba034145e57fc11733740463f383d32c7abee07bf1f8870b2ec9c999
-
SHA512
93fe2bc0ee5de4b440ba3f914f9ce101d3e1d9b1088b5c3129a60d09e52e837b93e72720a65ffde1348775a57c0a84b9c51c0be2cf57171445f0e7da87bfbef3
-
SSDEEP
1536:RO4wgZpwD6WRV25iS9FPzElWfVtjpIjS23+qRmndI2pSTq3:Ru+wJUiS95ztVtjpESNymndTpSTq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5418bbd0ba034145e57fc11733740463f383d32c7abee07bf1f8870b2ec9c999.doc windows office2003
ThisDocument
Module1
Module2
Module3