Behavioral task
behavioral1
Sample
855e261c88bc655bdce373879842153472d89ee0c2137f34fb95b35c0044f7f8.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
855e261c88bc655bdce373879842153472d89ee0c2137f34fb95b35c0044f7f8.doc
Resource
win10v2004-20221111-en
General
-
Target
855e261c88bc655bdce373879842153472d89ee0c2137f34fb95b35c0044f7f8
-
Size
35KB
-
MD5
30bca52669e9eb53d99adbf82c44b54b
-
SHA1
4a9b06a63fabad1eb64d15960ef254da08ebd70d
-
SHA256
855e261c88bc655bdce373879842153472d89ee0c2137f34fb95b35c0044f7f8
-
SHA512
fce4528e11060325abeb36fb095dde73cbf4702c43596116dfc4d417987198313c86bf54455badee1a2d10ef4dfe06fc138f6fdc94f6d2f03b3bf615c4b66e9a
-
SSDEEP
768:dwS2wBk0zYsu2hfaw7PNgelcRktpBKqB0W:5Tk0zo2hfawrNgelkwpBKI5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
855e261c88bc655bdce373879842153472d89ee0c2137f34fb95b35c0044f7f8.doc windows office2003
ThisDocument
frm
aIAav
asICPF
axQs2