Behavioral task
behavioral1
Sample
4b9e53abea046dd2194cfdc609487c7c7a12beac41a2d95434d35ee673306653.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b9e53abea046dd2194cfdc609487c7c7a12beac41a2d95434d35ee673306653.doc
Resource
win10v2004-20220812-en
General
-
Target
4b9e53abea046dd2194cfdc609487c7c7a12beac41a2d95434d35ee673306653
-
Size
215KB
-
MD5
04769ea34ec0803d2d195f833c4a29f0
-
SHA1
65d1a3cbed7bc4e0105630e58253ba47aec655ee
-
SHA256
4b9e53abea046dd2194cfdc609487c7c7a12beac41a2d95434d35ee673306653
-
SHA512
2733336c41471978a30002e9bd5d76b6a567bc2540a42a62e516269face1bb703c733911eb061e034e84bf8128c16c627340e547d69ff36a1b90a0a5019b8ee6
-
SSDEEP
3072:yoNWOgt6tFvQy1e37ETBkmtsHHHHHHHHHyQQQQQQQQQsfslFxpGWitrUX552GN:0OvFvQy7BkmPsfzG8x
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4b9e53abea046dd2194cfdc609487c7c7a12beac41a2d95434d35ee673306653.doc windows office2003
ThisDocument
Module1
Module2