Behavioral task
behavioral1
Sample
6a3b8b12c1f28cb223d4e5ee78b183dcf0446c7788ff3d60cb86d52c1ece8997.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a3b8b12c1f28cb223d4e5ee78b183dcf0446c7788ff3d60cb86d52c1ece8997.doc
Resource
win10v2004-20220812-en
General
-
Target
6a3b8b12c1f28cb223d4e5ee78b183dcf0446c7788ff3d60cb86d52c1ece8997
-
Size
86KB
-
MD5
805d7c4348240aa22dd9855916d2aec0
-
SHA1
74553d9f192c3cd50d44ee441e35b40b6bf91b6f
-
SHA256
6a3b8b12c1f28cb223d4e5ee78b183dcf0446c7788ff3d60cb86d52c1ece8997
-
SHA512
a797e8304c71ab691426f2f84afb84a469c90b4485246aa8436baeb242ac1fe7844acac34a90c16023ff0ac74254e05567c7d677c35468c8a834a804a4ab6d3a
-
SSDEEP
1536:XLcIyIEPALU5PkBpKqZJZqzkw1j/XXCnDXtxKX:XLVDEL5EpKqZJZUkw1j/ngrtx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6a3b8b12c1f28cb223d4e5ee78b183dcf0446c7788ff3d60cb86d52c1ece8997.doc windows office2003
ThisDocument
Module1
Module2
Module3