Behavioral task
behavioral1
Sample
37b3c577d0219d0fd41a2303351b4a95438c9521c9aa28625969f1f1ca303ad7.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
37b3c577d0219d0fd41a2303351b4a95438c9521c9aa28625969f1f1ca303ad7.doc
Resource
win10v2004-20220812-en
General
-
Target
37b3c577d0219d0fd41a2303351b4a95438c9521c9aa28625969f1f1ca303ad7
-
Size
118KB
-
MD5
9210b238074b755293c924848c614210
-
SHA1
3e0dad929e172649737dc0517f46d42f5a3c78ec
-
SHA256
37b3c577d0219d0fd41a2303351b4a95438c9521c9aa28625969f1f1ca303ad7
-
SHA512
fd3655a0f68d5d88dba336c0a3781e2f1a097564927a923547dba71e52ff01d97c851ad498f9057de32dcae710dac5bb5fd635db63f91043144cbaadc460f85f
-
SSDEEP
1536:87w87OkatCbhfF5tNbyhflytR6lk1LmtUjpIjS23+qRnzI2pSTq3t:88Q7bpNN+lSR6lklpjpESNKnzTpSTq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
37b3c577d0219d0fd41a2303351b4a95438c9521c9aa28625969f1f1ca303ad7.doc windows office2003
ThisDocument
Module1
Module2
Module3