Behavioral task
behavioral1
Sample
59e4f478176bcf7866754394d1ab9be378b8fe396b04f0b71767025a1ebbae38.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
59e4f478176bcf7866754394d1ab9be378b8fe396b04f0b71767025a1ebbae38.doc
Resource
win10v2004-20220901-en
General
-
Target
59e4f478176bcf7866754394d1ab9be378b8fe396b04f0b71767025a1ebbae38
-
Size
63KB
-
MD5
64ceb1849b574ad756dab8b9c0c4394b
-
SHA1
9e5a329fadf9dcb0539cb3be3e50591b9c74f2e9
-
SHA256
59e4f478176bcf7866754394d1ab9be378b8fe396b04f0b71767025a1ebbae38
-
SHA512
23cfc52df080bf822876f82e95c988ea932a27663226ea2782ef982c849d69ebf92ef7e78a919cf801fd3c700581506b6cfa3d5c326d3cdf277690c2f941c244
-
SSDEEP
768:S1YXzFkfr6WTadtttbSdtt0EEdtZNtHZtttttt4z63GSNFDLxz99JebjPR:pDFeVThzAPfDL3b
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
59e4f478176bcf7866754394d1ab9be378b8fe396b04f0b71767025a1ebbae38.doc windows office2003