Behavioral task
behavioral1
Sample
097d1b970439b86467bfae966d18f557b1b908e530902253b24c4180458f51e1.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
097d1b970439b86467bfae966d18f557b1b908e530902253b24c4180458f51e1.doc
Resource
win10v2004-20220812-en
General
-
Target
097d1b970439b86467bfae966d18f557b1b908e530902253b24c4180458f51e1
-
Size
65KB
-
MD5
757e9b7209f0d6ef3cf7bfd904445009
-
SHA1
d34317a440d28aaa4a4d7a480dbb89f15fa015bf
-
SHA256
097d1b970439b86467bfae966d18f557b1b908e530902253b24c4180458f51e1
-
SHA512
73566bbff3b8095aee5f703a90e5e832b1cb5d046fb7797c56a8ce2eeec8382d711a9086cc585ba280bd902f5026e380b700ca5bdee764515117f602e72b9335
-
SSDEEP
768:ixQWmIIOneS9i61e7TDIUSf5nB10zzpSw:ixnneSgMe7TDO1EzQw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
097d1b970439b86467bfae966d18f557b1b908e530902253b24c4180458f51e1.doc windows office2003
ThisDocument