Behavioral task
behavioral1
Sample
838af681a424fcc444dd6d1a0b5e16a2e1367afc5761bda1034d8eb47edd7976.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
838af681a424fcc444dd6d1a0b5e16a2e1367afc5761bda1034d8eb47edd7976.doc
Resource
win10v2004-20220812-en
General
-
Target
838af681a424fcc444dd6d1a0b5e16a2e1367afc5761bda1034d8eb47edd7976
-
Size
243KB
-
MD5
92bfcda12433a1ac754574ed7b38bfc0
-
SHA1
5d5cb2a9aebac305c0312740a32e27d51ace1244
-
SHA256
838af681a424fcc444dd6d1a0b5e16a2e1367afc5761bda1034d8eb47edd7976
-
SHA512
0aada0db1e231009c72084deb13685bf271f7a30874abe7cf330844a4da72294a27de9dee6764e163cd69493292914e70cd1b35c2cfa6bbf0939a16288029d6d
-
SSDEEP
3072:bjVMOVSOgt6tFvQy1e37ETBkmtsHHHHHHHHHyQQQQQQQQQsfslFxpGWitrUX/52c:bjVMsSOvFvQy7BkmPsfzG8H
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
838af681a424fcc444dd6d1a0b5e16a2e1367afc5761bda1034d8eb47edd7976.doc windows office2003
ThisDocument
Module1
Module2