Behavioral task
behavioral1
Sample
b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946.docx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946.docx
Resource
win10v2004-20220812-en
General
-
Target
b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946.docx
-
Size
70KB
-
MD5
497644181af1d32fb59192288d2a3e51
-
SHA1
7f887359da688a17e9eccb770bfe4e0706d41d29
-
SHA256
b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946
-
SHA512
d714c332e94f0e7bcabf005f82455ffc29705ece1b3885b019e4124bfa7ecae73abd2a6e71d19921e0d9ce055a820d35af174a2f867c1f187ea22fae3d33f3e3
-
SSDEEP
768:e8GblB8aJxzYFL7kYxTWwFPMfW9IDOUMEHOLPvOQHcluDsfMmSbcbK3y4q4vDbxu:eHpY3TFd1MfWNRSSCSxyB4vDb32
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b4a9250c39bf5f5b9f4c63bb25bae3d9b54c4e94e8797d40925cd422c8b5e946.docx.doc .docx windows office2003
ThisDocument