Behavioral task
behavioral1
Sample
2304c51602081d18c1429fa7d4f5db205869d545eeef9edeb3dfb8dfd511086c.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2304c51602081d18c1429fa7d4f5db205869d545eeef9edeb3dfb8dfd511086c.doc
Resource
win10v2004-20220812-en
General
-
Target
2304c51602081d18c1429fa7d4f5db205869d545eeef9edeb3dfb8dfd511086c
-
Size
15KB
-
MD5
125c98c06f979124494202d3cdb812e0
-
SHA1
d4cac3a2752d5b76867bd05732a3eaa038ff0cc8
-
SHA256
2304c51602081d18c1429fa7d4f5db205869d545eeef9edeb3dfb8dfd511086c
-
SHA512
6e104244ad12e81715139222cdc82689939b370dba4fc374ee3d68633ae4a51d908542730a0a730492b1adbc628ee33511191bb402e09b3f917dd486626118a4
-
SSDEEP
192:yDItiabv1N8r8gsgKQ/XGkAzv/iL/FEVW+E8o+MhxOWnE0jUUxJh+CXWya0:VtFvjAVROlzvKL9Ezo+MmB0jUm/+mp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2304c51602081d18c1429fa7d4f5db205869d545eeef9edeb3dfb8dfd511086c.doc windows office2003
ThisDocument