Behavioral task
behavioral1
Sample
6f6189c4f7dcf0ef0b1517391a37d0c71854433cd4fc2f7704b51174196a00c9.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6f6189c4f7dcf0ef0b1517391a37d0c71854433cd4fc2f7704b51174196a00c9.doc
Resource
win10v2004-20221111-en
General
-
Target
6f6189c4f7dcf0ef0b1517391a37d0c71854433cd4fc2f7704b51174196a00c9
-
Size
72KB
-
MD5
414f51289a29042fda23440a56b39670
-
SHA1
ff801b14a06827dd4fe4762ca2b63113f9d04351
-
SHA256
6f6189c4f7dcf0ef0b1517391a37d0c71854433cd4fc2f7704b51174196a00c9
-
SHA512
99853d84d048253d388c283638225d2bc17f93074c61b48705382f21dad428080fab395a6af714ca5b0bfb81b807940f4c7174322369265990c35c0de0df8694
-
SSDEEP
768:c0Q0oN6aGHjVytBE3Y/q6JuainMmGC2pK4uUwLT/NsgBHZ:ajpIjS23+q6UnMI2pSTqYZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
6f6189c4f7dcf0ef0b1517391a37d0c71854433cd4fc2f7704b51174196a00c9.doc windows office2003
ThisDocument
Module1
Module2
Module3