Behavioral task
behavioral1
Sample
f19d589c6440694b66616a7e1aa51cf412a4a37ee5f2aa2e2663ff4df5e7f789.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f19d589c6440694b66616a7e1aa51cf412a4a37ee5f2aa2e2663ff4df5e7f789.doc
Resource
win10v2004-20220812-en
General
-
Target
f19d589c6440694b66616a7e1aa51cf412a4a37ee5f2aa2e2663ff4df5e7f789
-
Size
263KB
-
MD5
3f97094b1edd0130b21f7248f101d71c
-
SHA1
207afefdff2f8cf5e903fd6444f1ef42198ac781
-
SHA256
f19d589c6440694b66616a7e1aa51cf412a4a37ee5f2aa2e2663ff4df5e7f789
-
SHA512
7fda9e3230075a0c3db7124d107b86ad28184225bd13919980a08ed1b1a22c88a0ae100d4fc04f9771697c3d05d55af8f48f655de8f0659fa549eb188a37c852
-
SSDEEP
3072:deUGz/m8A4v8yzUt6Ogt6tFvQy1e37ETBkmtsHHHHHHHHHyQQQQQQQQQsfslFxpe:d50UUOvFvQy7BkmPsfzG8Q
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f19d589c6440694b66616a7e1aa51cf412a4a37ee5f2aa2e2663ff4df5e7f789.doc windows office2003
ThisDocument
Module1
Module2