Behavioral task
behavioral1
Sample
0cb5d7106314ac85d496067a6ba75d4df512d862c3233a61a2d7010d322168fc.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0cb5d7106314ac85d496067a6ba75d4df512d862c3233a61a2d7010d322168fc.doc
Resource
win10v2004-20220901-en
General
-
Target
0cb5d7106314ac85d496067a6ba75d4df512d862c3233a61a2d7010d322168fc
-
Size
120KB
-
MD5
9262dccd7bf272ca946ec21a6186cb80
-
SHA1
c573a0e7f53e53030ebb6463021f2062bfb86887
-
SHA256
0cb5d7106314ac85d496067a6ba75d4df512d862c3233a61a2d7010d322168fc
-
SHA512
908830fb9535ed8707193263e7322747159d82e516c1e75a9dc923d85930faf5c3a993ef6e6bb12370549c2e47935d23b49606bacbd0e016de1bafb35b96894f
-
SSDEEP
3072:pjJ/p662hLVDEL5EpKqZJZpkw1j/+grtx:nh6hm5OK2J/kwZGytx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0cb5d7106314ac85d496067a6ba75d4df512d862c3233a61a2d7010d322168fc.doc windows office2003
ThisDocument
Module1
Module2
Module3