Behavioral task
behavioral1
Sample
78d84f8368b44692b74500f6071788170bc2fef27363586b6d569d745d1cf2a2.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78d84f8368b44692b74500f6071788170bc2fef27363586b6d569d745d1cf2a2.doc
Resource
win10v2004-20220901-en
General
-
Target
78d84f8368b44692b74500f6071788170bc2fef27363586b6d569d745d1cf2a2
-
Size
67KB
-
MD5
c075bcd452d7ff56968ed7a213459bdc
-
SHA1
dc54cdce93f54e1f4089000edfdc4e08428395dd
-
SHA256
78d84f8368b44692b74500f6071788170bc2fef27363586b6d569d745d1cf2a2
-
SHA512
ce7802282e7f000fdd07be60e6442b1099db12a48fd62d6968546a9f0fe7295c56ee047217f944cbb3850e549d5cc9be2d593208897a0c440c927255aae58fc0
-
SSDEEP
768:EPYyLPOo7UDgHdHTtQxzs9yKrGlj0+UKkj0ieAfYRpmeZtp:Eeuhtgs9Xkie8Y3H
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
78d84f8368b44692b74500f6071788170bc2fef27363586b6d569d745d1cf2a2.doc windows office2003
ThisDocument
UserForm1