Behavioral task
behavioral1
Sample
a8018436fac4ab8a0493cd5833b331d900e01d3c966825d1e4f338bd79efe8f8.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8018436fac4ab8a0493cd5833b331d900e01d3c966825d1e4f338bd79efe8f8.doc
Resource
win10v2004-20220901-en
General
-
Target
a8018436fac4ab8a0493cd5833b331d900e01d3c966825d1e4f338bd79efe8f8
-
Size
140KB
-
MD5
0a8d015b290b384e1b65dc75321c0650
-
SHA1
08ba0ccda6ab0146f5b045fed43ff10563163d9b
-
SHA256
a8018436fac4ab8a0493cd5833b331d900e01d3c966825d1e4f338bd79efe8f8
-
SHA512
daec4fc3703f89e17f0d78607b361b7968bf08f05c1f62ac5faf17e56de95104c6af6ec0ff4d9ed7020ce9a64811c76a189aadac5afb52c4668e610cec34daf1
-
SSDEEP
3072:dxsCQnvgeDaSnYkjVDEL5EpKqZJZtZw1j/igrtx:dxsHYzyhe5OK2JrZwZ6ytx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a8018436fac4ab8a0493cd5833b331d900e01d3c966825d1e4f338bd79efe8f8.doc windows office2003
ThisDocument
Module1
Module2
Module3