Behavioral task
behavioral1
Sample
a45e9e815b65697b2dabd839e42cfbcb1f3f8279fe11acc77490cf2a2c76d1d8.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a45e9e815b65697b2dabd839e42cfbcb1f3f8279fe11acc77490cf2a2c76d1d8.doc
Resource
win10v2004-20220812-en
General
-
Target
a45e9e815b65697b2dabd839e42cfbcb1f3f8279fe11acc77490cf2a2c76d1d8
-
Size
112KB
-
MD5
8452c4702cd9e38c4bebfbc274362570
-
SHA1
182bbf4958457c6a8ac40de3fccdcf49c325dd46
-
SHA256
a45e9e815b65697b2dabd839e42cfbcb1f3f8279fe11acc77490cf2a2c76d1d8
-
SHA512
3e0292c781c8c48a70ea3d4119dd625630c1621ac4b3af5872cdbef167cc025202c35fb0616e40db569ecc9e226ddfcbc1cabed02c94793dc096f4c973abac71
-
SSDEEP
3072:6U8QqENk2VDEL5EpKqZJZy1w1j/egrtx:x83Em5OK2JA1wZmytx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a45e9e815b65697b2dabd839e42cfbcb1f3f8279fe11acc77490cf2a2c76d1d8.doc windows office2003
ThisDocument
Module1
Module2
Module3