Behavioral task
behavioral1
Sample
a99e55d057ec51d20914de39f3e79ab76620ba0020cefb644ad36ab8b33522f2.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a99e55d057ec51d20914de39f3e79ab76620ba0020cefb644ad36ab8b33522f2.doc
Resource
win10v2004-20220901-en
General
-
Target
a99e55d057ec51d20914de39f3e79ab76620ba0020cefb644ad36ab8b33522f2
-
Size
98KB
-
MD5
62a7a56a09edb55c6a700b72335b0210
-
SHA1
1a0dc08a24d35ae12afe596f1cf6405720e93db5
-
SHA256
a99e55d057ec51d20914de39f3e79ab76620ba0020cefb644ad36ab8b33522f2
-
SHA512
27431b27b9a6b05edee3541a497e80117b1afc6f1f905177d5b815b9dff366faacb20f986b12678e2f2af76435cf37c290bbd265e49469599e18347592e5d9e1
-
SSDEEP
1536:OUVyHqzJI2bOcOjjpIjS23+qEdjn9I2pSTq3:FeyI2bzcjpESN5jn9TpSTq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a99e55d057ec51d20914de39f3e79ab76620ba0020cefb644ad36ab8b33522f2.doc windows office2003
ThisDocument
Module1
Module2
Module3