Behavioral task
behavioral1
Sample
df04307cbc6f2ed58ca38cfa4663214a1eac440668408bc8e40b3471485b244e.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
df04307cbc6f2ed58ca38cfa4663214a1eac440668408bc8e40b3471485b244e.doc
Resource
win10v2004-20220812-en
General
-
Target
df04307cbc6f2ed58ca38cfa4663214a1eac440668408bc8e40b3471485b244e
-
Size
38KB
-
MD5
b40da2cd4b83ac44eaff9702623ba439
-
SHA1
0b30860618f2d967392b755b25d6592bb7213dd7
-
SHA256
df04307cbc6f2ed58ca38cfa4663214a1eac440668408bc8e40b3471485b244e
-
SHA512
96e258efeaa52588bc85eaa2c183e4cb2acca1f38a70f487674e7ec3548997fcaae8ef7a73ec5cd2b5c104e19a83e76fad67004097f35742d1c49c7fff93ba24
-
SSDEEP
384:Cg3JJkzXAlCQDbqaQs1tMrtLITUvw50jsacezveFi2by4RTiOa6Y8p:jJJk8EQv4eA0IveFi2byyGdb8p
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
df04307cbc6f2ed58ca38cfa4663214a1eac440668408bc8e40b3471485b244e.doc windows office2003
ThisDocument
myshow
aokBN
aaiM6
a0miPy