Behavioral task
behavioral1
Sample
9eacb10396c0228bc3f58cad7cd07897c75c9a51072b64d087a6402a9b9b47fb.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9eacb10396c0228bc3f58cad7cd07897c75c9a51072b64d087a6402a9b9b47fb.doc
Resource
win10v2004-20220812-en
General
-
Target
9eacb10396c0228bc3f58cad7cd07897c75c9a51072b64d087a6402a9b9b47fb
-
Size
255KB
-
MD5
6622e52da27b23fccc0408ae07c6f680
-
SHA1
fbd387304483e2859e50bd3cf7bb87399ef350ab
-
SHA256
9eacb10396c0228bc3f58cad7cd07897c75c9a51072b64d087a6402a9b9b47fb
-
SHA512
75daf4b66bc3b77d5f46c472112917964d658a0fb03b4481393c2307445af464f92bcb12908b3b43e9c4116476bd3abfffddc957af53e639e4994fe9b31a8638
-
SSDEEP
3072:KP+2sD2L9F98jIBzRlOgt6tFvQy1e37ETBkmtsHHHHHHHHHyQQQQQQQQQsfslFxl:q+D6rSQ7OvFvQy7BkmPsfzG8t
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9eacb10396c0228bc3f58cad7cd07897c75c9a51072b64d087a6402a9b9b47fb.doc windows office2003
ThisDocument
Module1
Module2