Behavioral task
behavioral1
Sample
eea32a2b11f0bf499eef33470fc5159bb29d4450955b5be7e566ff4fb86b59aa.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eea32a2b11f0bf499eef33470fc5159bb29d4450955b5be7e566ff4fb86b59aa.doc
Resource
win10v2004-20221111-en
General
-
Target
eea32a2b11f0bf499eef33470fc5159bb29d4450955b5be7e566ff4fb86b59aa
-
Size
65KB
-
MD5
bcd3323bea1ff0822af47cbdaf645220
-
SHA1
3d60342f75246c626792fa7cae27e40391b07d8b
-
SHA256
eea32a2b11f0bf499eef33470fc5159bb29d4450955b5be7e566ff4fb86b59aa
-
SHA512
cad818de37c8ab8aedd9480e85f0cc03062c392c2f79a843f797a6fd0ba113acd04aab6457f699f4182b053be5330d9dd340073ac9277500539668a1926e6267
-
SSDEEP
768:jdKwxJYneS9j8gQHqcvIUSf5nis6ThLzHw:jdRYneSl5QHqEO1l6Th3w
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
eea32a2b11f0bf499eef33470fc5159bb29d4450955b5be7e566ff4fb86b59aa.doc windows office2003
ThisDocument