Behavioral task
behavioral1
Sample
0baebe6b45f0df06ebf8f0c5e85ec813a9a1382e6aeb56f25abf891577338bef.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0baebe6b45f0df06ebf8f0c5e85ec813a9a1382e6aeb56f25abf891577338bef.doc
Resource
win10v2004-20221111-en
General
-
Target
0baebe6b45f0df06ebf8f0c5e85ec813a9a1382e6aeb56f25abf891577338bef
-
Size
75KB
-
MD5
98cc65ede97e75f6e69afc22ca9bed9c
-
SHA1
40114416e7de4a50131d12f88ae198cdf30a52d0
-
SHA256
0baebe6b45f0df06ebf8f0c5e85ec813a9a1382e6aeb56f25abf891577338bef
-
SHA512
ce0d53698677f5744e564bf824ef66f2772d0dd27c963f715509e50a14e89eb145e22e714d45b8c5f1b37a957d2d4757bcb63290d212ca789d6cc89114fb825b
-
SSDEEP
768:Yq0qOVL9sXMtNAnpQUzv1CAPowxtLLR4vrpXI6joLFDzA:Yq0qOVMMt2KUsAPowR+pI6MhD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0baebe6b45f0df06ebf8f0c5e85ec813a9a1382e6aeb56f25abf891577338bef.doc windows office2003