Behavioral task
behavioral1
Sample
055c7e27af7f47519d7b7e373824404d2380b758d9484fe95ccb3c9d40b111c8.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
055c7e27af7f47519d7b7e373824404d2380b758d9484fe95ccb3c9d40b111c8.doc
Resource
win10v2004-20221111-en
General
-
Target
055c7e27af7f47519d7b7e373824404d2380b758d9484fe95ccb3c9d40b111c8
-
Size
19KB
-
MD5
1f4f9331a62c3f232f4e49459eaf80f2
-
SHA1
d147ee9ef3dbee38de242dafa3708072e5c23254
-
SHA256
055c7e27af7f47519d7b7e373824404d2380b758d9484fe95ccb3c9d40b111c8
-
SHA512
2ffa02d1a0368cacab3f4c3653f62c3cc73828182eaadb652cc892671ce0e641536f1eafaae227fdcd66d8b047050ab6f44e2b2a8fa4fa373f44148b45c6c675
-
SSDEEP
192:mP74w02N7yAl/TZWYya8Z0jphl4tXvQr/MnMDd+XVCbTaW:a4N2h7D8Z0jXatGUnMDd+lC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
055c7e27af7f47519d7b7e373824404d2380b758d9484fe95ccb3c9d40b111c8.doc windows office2003
ThisDocument
ajtw4M
aJaPbE
a8ieR
alZF2