Behavioral task
behavioral1
Sample
484ca148f597901cbac2b9d3bc3d8344de3132b6c47570e5fe470c684d2fb73c.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
484ca148f597901cbac2b9d3bc3d8344de3132b6c47570e5fe470c684d2fb73c.doc
Resource
win10v2004-20220812-en
General
-
Target
484ca148f597901cbac2b9d3bc3d8344de3132b6c47570e5fe470c684d2fb73c
-
Size
51KB
-
MD5
80074b574648fb1879389d28e657c50e
-
SHA1
320151176c5c1641dfbc4ff659243defd4b6fc6d
-
SHA256
484ca148f597901cbac2b9d3bc3d8344de3132b6c47570e5fe470c684d2fb73c
-
SHA512
772fd78c37accce559c0561165f100968bb0edd39bcde227bfa219f7c0fe042dfa16957b7a1c7d7814fcea8615ccddca67993ece8bb6999b045bb3cc3c43fe4e
-
SSDEEP
768:JSQgLeeCOpCLMkDklzFLcVrbCUb3zuaXp32:cQgLeeCOpCLM5FL0tb39
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
484ca148f597901cbac2b9d3bc3d8344de3132b6c47570e5fe470c684d2fb73c.doc windows office2003