Behavioral task
behavioral1
Sample
8d3de338b1f13c55c73461a24fef506de8733e392cd145cc3a6a843bab28ee3d.docm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d3de338b1f13c55c73461a24fef506de8733e392cd145cc3a6a843bab28ee3d.docm
Resource
win10v2004-20220901-en
General
-
Target
8d3de338b1f13c55c73461a24fef506de8733e392cd145cc3a6a843bab28ee3d
-
Size
319KB
-
MD5
12c0a3f94e87c9c4baa70e63cbb8f132
-
SHA1
219588d23f281f1fafad61780c115e1f61c7cd52
-
SHA256
8d3de338b1f13c55c73461a24fef506de8733e392cd145cc3a6a843bab28ee3d
-
SHA512
4c899b199222ba9c21f173106f370cb6c7227be2fca4c1e45584aa96f466bc7de7c9c2ccd6eb5e70455571a8f6181c2eb03a446eb38a3dcfec0f4e1e5c63039a
-
SSDEEP
6144:icLvD4srV1TVGRcF0VmmiyrC3gbYMnHO6AK2XG:0iVoRcJyrCM5HO662
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8d3de338b1f13c55c73461a24fef506de8733e392cd145cc3a6a843bab28ee3d.docm .js office2007
ThisDocument
UserForm1
NewMacros