Behavioral task
behavioral1
Sample
9e4463e8aee617b7af4562b55d87de170e5b17da442a246890e5d1d91dd48c25.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9e4463e8aee617b7af4562b55d87de170e5b17da442a246890e5d1d91dd48c25.doc
Resource
win10v2004-20220812-en
General
-
Target
9e4463e8aee617b7af4562b55d87de170e5b17da442a246890e5d1d91dd48c25
-
Size
12KB
-
MD5
213ad3ec7ab784473c4386abc8e41a10
-
SHA1
84cfae26134b1b7a686086da5e1bf8b14359cbb0
-
SHA256
9e4463e8aee617b7af4562b55d87de170e5b17da442a246890e5d1d91dd48c25
-
SHA512
9846081ac044d6cd4310ba55a90a3dc56a902cbc71ddee14fe4477457db5d5c79f4fba6349c8b549a8734699ea7a98335dbda648f547bfeea70fddfc09c95853
-
SSDEEP
192:xlkWkiWQX0jTBtTfDv8Ba7WzwDQxtNynJa:EWk6X0jTBtrvFHDQxtNe
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9e4463e8aee617b7af4562b55d87de170e5b17da442a246890e5d1d91dd48c25.doc windows office2003
ThisDocument