Behavioral task
behavioral1
Sample
7a2422c7c9de57b2b1160f42bcc4b6a1a837134cbfd9ced11712df1553d70324.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a2422c7c9de57b2b1160f42bcc4b6a1a837134cbfd9ced11712df1553d70324.doc
Resource
win10v2004-20221111-en
General
-
Target
7a2422c7c9de57b2b1160f42bcc4b6a1a837134cbfd9ced11712df1553d70324
-
Size
19KB
-
MD5
da0214f415e441fb88cb4f79d0820699
-
SHA1
16fa4cd82880bdee0aa4c10233ae4a21eec91e90
-
SHA256
7a2422c7c9de57b2b1160f42bcc4b6a1a837134cbfd9ced11712df1553d70324
-
SHA512
bb6cd017e186ae176575bb34afba93b7b3faf05d4fb4ee882be552f43da656be3dedabc2d6cadc725df369794014d3d0129cb8b999d2a6d11e444b0067f47272
-
SSDEEP
192:RbhHcNPh0QooIJTpxiOZBf9Q+My0950jBXht4hnfvuaemajpac:LHcNPKQooUxp+J950jBxtYeaemaZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
7a2422c7c9de57b2b1160f42bcc4b6a1a837134cbfd9ced11712df1553d70324.doc windows office2003
ThisDocument
aqj05
a5rKY
auQOL
aRBYm0