Behavioral task
behavioral1
Sample
a63a798b0cd272b1f6f3357ebbcf1007655cb7649e0ab9c8c1147a2e1614c6f5.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a63a798b0cd272b1f6f3357ebbcf1007655cb7649e0ab9c8c1147a2e1614c6f5.doc
Resource
win10v2004-20220812-en
General
-
Target
a63a798b0cd272b1f6f3357ebbcf1007655cb7649e0ab9c8c1147a2e1614c6f5
-
Size
231KB
-
MD5
6f2230eba357513633900252f7b5cc00
-
SHA1
718cf29162a93507ee4317b7aaf77f0bf36231af
-
SHA256
a63a798b0cd272b1f6f3357ebbcf1007655cb7649e0ab9c8c1147a2e1614c6f5
-
SHA512
04a2064518d0fb1af90f6b7d0b19d92e3288322b08b7a3216edbd2570a712d94aac3a0e8aaa2034fba69f5953a2094221821c7cf5900b3eeb43c576c0fd049b8
-
SSDEEP
3072:grOhocZWItZw/US08dtUcjJrfLulbiHY4+aN6M90puQLuSx7D+lWsz1lh+:grqVtZw/UO7JJjSpDa79yuQLSlc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a63a798b0cd272b1f6f3357ebbcf1007655cb7649e0ab9c8c1147a2e1614c6f5.doc windows office2003
ThisDocument
Module1
Module2