Behavioral task
behavioral1
Sample
315edadf8ad09e31ee7a7e113bbea818a49dde6b3e9620c5596001e4250d7322.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
315edadf8ad09e31ee7a7e113bbea818a49dde6b3e9620c5596001e4250d7322.doc
Resource
win10v2004-20220812-en
General
-
Target
315edadf8ad09e31ee7a7e113bbea818a49dde6b3e9620c5596001e4250d7322
-
Size
104KB
-
MD5
04486059f2c722313637788750f3c910
-
SHA1
b7ce7b27310a6623e8a217baa18921aadfa86329
-
SHA256
315edadf8ad09e31ee7a7e113bbea818a49dde6b3e9620c5596001e4250d7322
-
SHA512
9d18685f50777563eb5b1f4527a2c0b265a96dd108307f775f454b200ca5c20889918ac74527f79284b25e674530d2a9c54827886ac130d126c2c02855bb6ef5
-
SSDEEP
1536:GweEY17whW0u/CcEWpiQ3rQnbovsRBv+/j5Y17YVpAPo8rv:nY1IBUCE13cIsRBv+/j5Y18VpAz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
315edadf8ad09e31ee7a7e113bbea818a49dde6b3e9620c5596001e4250d7322.doc windows office2003