Behavioral task
behavioral1
Sample
9030c3066cf90e1cc357dc011aa48c9738eb161098b65b3bdd0d7db9cbdf8d15.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9030c3066cf90e1cc357dc011aa48c9738eb161098b65b3bdd0d7db9cbdf8d15.doc
Resource
win10v2004-20220812-en
General
-
Target
9030c3066cf90e1cc357dc011aa48c9738eb161098b65b3bdd0d7db9cbdf8d15
-
Size
72KB
-
MD5
0042beabd4cf39cdd00c8a2e3ad79410
-
SHA1
d7c64ca16877aabbd9f6aebed9ce6c1d4bd402d4
-
SHA256
9030c3066cf90e1cc357dc011aa48c9738eb161098b65b3bdd0d7db9cbdf8d15
-
SHA512
2a9709ce5f8e7aac77748f5111936b40b4087f9c529d86b5936c59e12ae92968e0305a4ed3f5d16be9481e12e9998c3ad1df3f3d279583b82caec5b5af3aba17
-
SSDEEP
768:tjMouowzDfTHxxmsp8Zgmor91ZTYM2bPBBkla0bBfgZjmr7GjWabkw9:r0FgcBab
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9030c3066cf90e1cc357dc011aa48c9738eb161098b65b3bdd0d7db9cbdf8d15.doc windows office2003