Behavioral task
behavioral1
Sample
52791bb3215bd1609951be4f510063942db0557162cb64f4faddeb4cfe0c5382.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
52791bb3215bd1609951be4f510063942db0557162cb64f4faddeb4cfe0c5382.doc
Resource
win10v2004-20220812-en
General
-
Target
52791bb3215bd1609951be4f510063942db0557162cb64f4faddeb4cfe0c5382
-
Size
238KB
-
MD5
449f7a22bfacac8784366b0d494bf201
-
SHA1
fb9485c7b42be9d467e76433028e0951c923e650
-
SHA256
52791bb3215bd1609951be4f510063942db0557162cb64f4faddeb4cfe0c5382
-
SHA512
ea28e16c39e4db6aad0dec652e43d101e7c28ae117fc1a74db679d163b2bf51abcdbeb4e5dd008cf6babe7387fd030f8de6e5e7b4dd3f1c6455b57718a46a187
-
SSDEEP
3072:+LkgIoBTI7spw7uzeJq+oqZSqfFRy7U5uW:8abawDJhoeS8RqD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
52791bb3215bd1609951be4f510063942db0557162cb64f4faddeb4cfe0c5382.doc windows office2003
ThisDocument
Module1
Module2