Behavioral task
behavioral1
Sample
a2a8f44677dd70276e22d0a264cf3c1b165cfe3c403494079ce06d67613b5f15.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2a8f44677dd70276e22d0a264cf3c1b165cfe3c403494079ce06d67613b5f15.doc
Resource
win10v2004-20220812-en
General
-
Target
a2a8f44677dd70276e22d0a264cf3c1b165cfe3c403494079ce06d67613b5f15
-
Size
80KB
-
MD5
1fdb0af80d01739410a3eef67c4144ff
-
SHA1
481978eecb1ae94824156710bf96fc30bbfdbd37
-
SHA256
a2a8f44677dd70276e22d0a264cf3c1b165cfe3c403494079ce06d67613b5f15
-
SHA512
8a8fad2f02a6188ffc8e3edc7c0a5c756fb23c03d3e267bb77f3f5840e439feef3486a58140cb0de8b4194f8c12b901547aacb7d4a7a7e7057bb8b8ae81c05fd
-
SSDEEP
768:qE8JHBxAs5vpKOtxJwJWjCKY6MiWY1/qP/JOgA0+xk0bl6wafgn8w/Ss:vQ1vhhMbRFiWYVqnA1k0bsfML
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a2a8f44677dd70276e22d0a264cf3c1b165cfe3c403494079ce06d67613b5f15.doc windows office2003
ThisDocument
Module1
Module2
Module3