Behavioral task
behavioral1
Sample
0a7bcbc587a92ceef1fea736f073f39e5cfcdfe68a7072ac99fca02e8be4e889.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a7bcbc587a92ceef1fea736f073f39e5cfcdfe68a7072ac99fca02e8be4e889.doc
Resource
win10v2004-20220812-en
General
-
Target
0a7bcbc587a92ceef1fea736f073f39e5cfcdfe68a7072ac99fca02e8be4e889
-
Size
239KB
-
MD5
80bfc1b28e46d02e8bf205cc239806a0
-
SHA1
3e8db7d06bbc4a844e67df27f1b4411323d4259e
-
SHA256
0a7bcbc587a92ceef1fea736f073f39e5cfcdfe68a7072ac99fca02e8be4e889
-
SHA512
176bb08e7de21b48b280a4789e36dea9698e0fdbf7f8aca701f8f16280cad2616b150e84622e67f3fe7d5f8217b8be373c8e9563091d4c2238f0199c97b3791e
-
SSDEEP
3072:D3j9fbCKnEW9rB+Rwx0UbpwWjJrfLulbiHY4+aN6M90puQLuSx7D+lWszxlE+:D3jcpW9l+RwmUaoJjSpDa79yuQLSlr
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0a7bcbc587a92ceef1fea736f073f39e5cfcdfe68a7072ac99fca02e8be4e889.doc windows office2003
ThisDocument
Module1
Module2