Behavioral task
behavioral1
Sample
4c791d9c64df3445828aca48ee3a81f29d759815f140c4acd25a42d89bffb697.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4c791d9c64df3445828aca48ee3a81f29d759815f140c4acd25a42d89bffb697.doc
Resource
win10v2004-20221111-en
General
-
Target
4c791d9c64df3445828aca48ee3a81f29d759815f140c4acd25a42d89bffb697
-
Size
61KB
-
MD5
3d15197c7672fd753d1f1ef1b9d5b404
-
SHA1
fef7cc01e94419258ea170bc7a3437da39cf7463
-
SHA256
4c791d9c64df3445828aca48ee3a81f29d759815f140c4acd25a42d89bffb697
-
SHA512
a6c102746668a2d0f00118588562b31ca1a615b2e8bb06229dd149ae62eb7e056cf49da1a615060020fe3f62b9011bb65a27790281a91b63e9f66b3378a39fdf
-
SSDEEP
768:k+Si57Uk9D8WyLCr3Pyf3Mrg+UjXenepOaZciYnTvBY:MHkmWQm3PyOQOaZ8nl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
4c791d9c64df3445828aca48ee3a81f29d759815f140c4acd25a42d89bffb697.doc windows office2003
ThisDocument
UserForm1