Behavioral task
behavioral1
Sample
344342cefab0fd4670274338a8005fa9564fa91219a995c62527f6b3f11526ad.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
344342cefab0fd4670274338a8005fa9564fa91219a995c62527f6b3f11526ad.doc
Resource
win10v2004-20220812-en
General
-
Target
344342cefab0fd4670274338a8005fa9564fa91219a995c62527f6b3f11526ad
-
Size
117KB
-
MD5
8059372577a607cff7d3c9834f51b4b0
-
SHA1
b3e36df973bc3cec69c9cfd7dfa03178b12b71df
-
SHA256
344342cefab0fd4670274338a8005fa9564fa91219a995c62527f6b3f11526ad
-
SHA512
7ba578186d3655b6c1ac8159b0a6884c28e8379d82df0429521159066a4767cb5ae2fcd593df2065770abea531206f3cf58d54114645b251848dce8cf2ed7eca
-
SSDEEP
768:BEUUFKy1AL4iMiwRAPocxw8X+NvCy5IhPah802YuI4e:BBKB6oAPovM+NvOPN09uNe
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
344342cefab0fd4670274338a8005fa9564fa91219a995c62527f6b3f11526ad.doc windows office2003