Behavioral task
behavioral1
Sample
2a3b9e2152581553fc9ec1f1fe5c7e28771163eb5044e735d927c5d067931d14.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a3b9e2152581553fc9ec1f1fe5c7e28771163eb5044e735d927c5d067931d14.doc
Resource
win10v2004-20220812-en
General
-
Target
2a3b9e2152581553fc9ec1f1fe5c7e28771163eb5044e735d927c5d067931d14
-
Size
220KB
-
MD5
f313035217e7e23f47e02581bf8195c1
-
SHA1
e08ebfff7874fe47d039fada6df27c230ca3cbb8
-
SHA256
2a3b9e2152581553fc9ec1f1fe5c7e28771163eb5044e735d927c5d067931d14
-
SHA512
e012ebe2eb3f59aff17f9b680f3f3dfd474692ca8769419a5f9092720e419915659045995c1d012c6d870dc3d64234f6bdbc6b2cad43551ac7f91d93e26e5950
-
SSDEEP
1536:CCirqGMRWp6kXw7bF3qjJzeJXbu+oXbuZSXbufqJAvL9C5uW/Hc:CCg3gspw7uzeJq+oqZSqfDvLU5uW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2a3b9e2152581553fc9ec1f1fe5c7e28771163eb5044e735d927c5d067931d14.doc windows office2003
ThisDocument
Module1
Module2