Behavioral task
behavioral1
Sample
953bd3d7ffac8b93d5156207616dd9a21b45a50c52fc7c9a0c5a2cdd601fa51e.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
953bd3d7ffac8b93d5156207616dd9a21b45a50c52fc7c9a0c5a2cdd601fa51e.doc
Resource
win10v2004-20220812-en
General
-
Target
953bd3d7ffac8b93d5156207616dd9a21b45a50c52fc7c9a0c5a2cdd601fa51e
-
Size
197KB
-
MD5
93237b3f9fd3706cbcccd31281db9030
-
SHA1
3346fdcecc312409ea3f1ea98837ae14ff720045
-
SHA256
953bd3d7ffac8b93d5156207616dd9a21b45a50c52fc7c9a0c5a2cdd601fa51e
-
SHA512
6e4d5bb95253d180fa48bbff5b075478473a280646896470aef15d4d719682ebd1edc1909fdd47eee20c8dfc0489326c9f8fe210d523d85979a63a153ecd5e60
-
SSDEEP
1536:AAdtnsGXtaO2hx3JcdjijJKaZMySsGLstlqGR9CJ66rsfgYcJF:AALsG9R2n3SdjijJK6Uil/8JqYYc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
953bd3d7ffac8b93d5156207616dd9a21b45a50c52fc7c9a0c5a2cdd601fa51e.doc windows office2003
ThisDocument
Module1
Module2