Behavioral task
behavioral1
Sample
313f5047cdaa0f8caae5af4eb206f564d5e8340e0f5834fde5f6dbd0e1c9aa86.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
313f5047cdaa0f8caae5af4eb206f564d5e8340e0f5834fde5f6dbd0e1c9aa86.doc
Resource
win10v2004-20220812-en
General
-
Target
313f5047cdaa0f8caae5af4eb206f564d5e8340e0f5834fde5f6dbd0e1c9aa86
-
Size
225KB
-
MD5
915dde1e749b94db9ca83e04099bd3f0
-
SHA1
2319a6d49043bd3ebaecc70c8afa259324f00740
-
SHA256
313f5047cdaa0f8caae5af4eb206f564d5e8340e0f5834fde5f6dbd0e1c9aa86
-
SHA512
63743fa587e3032b09cb16fb2f2c6ab7c823d42b0ae34265a1d46d6c20a3c55704b614084539d39ab6da8581be01bf23bd65dae1290704cc248c872a45a541b7
-
SSDEEP
3072:CaDhHYq7HIspw7uzeJq+oqZSqff1U5uW:CaqawDJhoeS21D
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
313f5047cdaa0f8caae5af4eb206f564d5e8340e0f5834fde5f6dbd0e1c9aa86.doc windows office2003
ThisDocument
Module1
Module2