Behavioral task
behavioral1
Sample
f88c53e3e68c97074bcfb428161a1cad2c35c542ece7a2efe9650bda89f8620d.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f88c53e3e68c97074bcfb428161a1cad2c35c542ece7a2efe9650bda89f8620d.doc
Resource
win10v2004-20220812-en
General
-
Target
f88c53e3e68c97074bcfb428161a1cad2c35c542ece7a2efe9650bda89f8620d
-
Size
32KB
-
MD5
fcd42fc6b8503bd9289c69ae576e5a90
-
SHA1
eee84438eae7c33c450696c3d76f81665663a57d
-
SHA256
f88c53e3e68c97074bcfb428161a1cad2c35c542ece7a2efe9650bda89f8620d
-
SHA512
76f1979f21c8a4e34898c82e7a8ba89dad3219a8bd4a48193f4885f768f1a21ecdd8f06619ec87f3712f605718b28b3bac296c43afd9f4538c6f2a8f3515fccb
-
SSDEEP
768:RI4Z5croaSNRI98B+jaema1x3F8nZuXpi:rpqdaema1lFcZuX
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
f88c53e3e68c97074bcfb428161a1cad2c35c542ece7a2efe9650bda89f8620d.doc .vbs windows office2003
ThisDocument
frm
aaz7kR
aCbMU