Behavioral task
behavioral1
Sample
b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946.doc
Resource
win10v2004-20220812-en
General
-
Target
b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946.7z
-
Size
36KB
-
MD5
0fbd136010a8cbeaa234fe6b12411f16
-
SHA1
deb902c3d271ba751091625da075365248a146bf
-
SHA256
8e7c8559f8e55dc46c1ee9eb88994895bfc6b65f59dca19baa6d5aa6ddb34f62
-
SHA512
a1bcf5c390107d0c12ea591dfd114ba5bd82756d4a6218882012e11dab81c9a1b863410db9ecd2eff59b6a08a8ed6789204b71f85ec1897f4c2d5a53c5cf0d72
-
SSDEEP
768:WUJhGFPdofYIFC5xTvKfyBqqViwoaQUjga079FOBDF8nJ3gy8Px5a3xWvXx:BeFVmYIFQTifhqT7QUPkc8qVMmXx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946 office_macro_on_action -
resource static1/unpack001/b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946
Files
-
b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946.7z.7z
Password: infected
-
b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946.doc windows office2003
ThisDocument