Behavioral task
behavioral1
Sample
f7bbaabbfca907f5e346b90a1c97617332bdb6599681232868cd1009f37ac27a.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7bbaabbfca907f5e346b90a1c97617332bdb6599681232868cd1009f37ac27a.doc
Resource
win10v2004-20220901-en
General
-
Target
f7bbaabbfca907f5e346b90a1c97617332bdb6599681232868cd1009f37ac27a
-
Size
220KB
-
MD5
26d3250446d82d70b90d40e7bbc6f743
-
SHA1
631ba15cb47c81639b8562089c37f7eb3f2e6c57
-
SHA256
f7bbaabbfca907f5e346b90a1c97617332bdb6599681232868cd1009f37ac27a
-
SHA512
07d0640d4f5958a9bfc39770cd2976135b1a424135cbb797ffbb3a4e6d3cfaea5fde194b9a2bf1b3f623ed6be8d72a06451af698ef7579a47f193b46285f532a
-
SSDEEP
6144:f8IzWeKyKNDClJqqy4vTJuZSZ2KQitfyZMI+q79:f8IzFKD2i4bJuZI2utq1+q79
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f7bbaabbfca907f5e346b90a1c97617332bdb6599681232868cd1009f37ac27a.doc windows office2003