Behavioral task
behavioral1
Sample
59ff18361ebf4c9922f61d863f3437882ac336019222c3b1536dbc474e575694.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
59ff18361ebf4c9922f61d863f3437882ac336019222c3b1536dbc474e575694.doc
Resource
win10v2004-20221111-en
General
-
Target
59ff18361ebf4c9922f61d863f3437882ac336019222c3b1536dbc474e575694
-
Size
29KB
-
MD5
79d04a7f8ee0cdf0e9c99508471949af
-
SHA1
13b30c08d4d2d80e8ccdc569c3b955d6bed9d74a
-
SHA256
59ff18361ebf4c9922f61d863f3437882ac336019222c3b1536dbc474e575694
-
SHA512
961d494ef5c0e1176986b69f06f3425c50ae669ddb9014ce4014dd377bd8d7dc59dc6777bcab4c7987bd94aa23619495e7dd2a31d0adf606cac318f6ee0fb251
-
SSDEEP
192:wXqSZEvA+6/6rjJ+eTV1/7/8zEsswwwPYaP+CUWMRFt0jGWfXt6n8W27a:wuiSdJ7UzbwC7MRFt0jGWPtm32
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
59ff18361ebf4c9922f61d863f3437882ac336019222c3b1536dbc474e575694.doc windows office2003
ThisDocument