Behavioral task
behavioral1
Sample
4d527ecbc4f02f41d063f56a8b0fbcc0bc9188abb8914a87c21586c9eaa966ff.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d527ecbc4f02f41d063f56a8b0fbcc0bc9188abb8914a87c21586c9eaa966ff.doc
Resource
win10v2004-20220812-en
General
-
Target
4d527ecbc4f02f41d063f56a8b0fbcc0bc9188abb8914a87c21586c9eaa966ff
-
Size
29KB
-
MD5
600c36e59b95192d4a8df9c0732f51d9
-
SHA1
c03c33057660b414708c8220efa276455bd8f0ad
-
SHA256
4d527ecbc4f02f41d063f56a8b0fbcc0bc9188abb8914a87c21586c9eaa966ff
-
SHA512
41829b96d6522d2e198aba2d6644a18fa633e251984a76974bbe48e43383744635b7f7b88318df356e842a0d3512137856cb511e181f78b4f8529c36f769f5f0
-
SSDEEP
384:jcUtwLTZ0jnqEJxYXcN8EEqm/ntD/AAa+ma1xTJqPPlap:4UtwhgqE4Xc+EEqmBPa+ma1xTU1ap
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4d527ecbc4f02f41d063f56a8b0fbcc0bc9188abb8914a87c21586c9eaa966ff.doc windows office2003
ThisDocument
myf
ax2em
aejKVs
aYPqc