Behavioral task
behavioral1
Sample
SecuriteInfo.com.Script.SNH-gen.3700.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Script.SNH-gen.3700.doc
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Script.SNH-gen.3700.19492
-
Size
392KB
-
MD5
9d7c2440b2dc1fabe21e9b79f8f0677c
-
SHA1
b463eb369f1b49351ee656bb7905b2862b5d01eb
-
SHA256
1e10ef03ad8ea5fad3e40fa1b76a4a1f33badcd4518f89f6430f782e0fa99909
-
SHA512
6b0a646a37a34c734ac91f855f354b10f4d24325b74ed5dc1f1a7cad584f697d4e7f6df6cb2b650091d4034987aa4bd0d8dff07a912306ab198b43be55360769
-
SSDEEP
3072:pJBjSgN8ERyopdVg+dqG9dvsqrqVWCEqrKks6xRzimkK6YG7F1O6y7hb7Ee6ha47:1h5CEqhx4eKc5brMbhNBYebsxJ7QyQt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
SecuriteInfo.com.Script.SNH-gen.3700.19492.doc .19492 windows office2003