Behavioral task
behavioral1
Sample
27d465eb58e46936afa1fea9efd2af211d8b57db447088e69d791b6f302b322d.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
27d465eb58e46936afa1fea9efd2af211d8b57db447088e69d791b6f302b322d.doc
Resource
win10v2004-20220812-en
General
-
Target
27d465eb58e46936afa1fea9efd2af211d8b57db447088e69d791b6f302b322d
-
Size
39KB
-
MD5
7f3c2b0c5abe311f4e40b2a938a8ed75
-
SHA1
de424630248406ab3380dc6af0e1307b3ede5396
-
SHA256
27d465eb58e46936afa1fea9efd2af211d8b57db447088e69d791b6f302b322d
-
SHA512
898d5a419325d0c96a6b43734a2794cf0e824827a14b4a58a50facec7bb1ad6f1d498e73a90218aac2cb3beeef5bb22685bc6864357bedf1f11dc1a171cb43c2
-
SSDEEP
384:fNNNNOIPo2IA+KbFYfLyxnYWTZ0j3vJURfty:pA2INZ4nYiwvJURU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
27d465eb58e46936afa1fea9efd2af211d8b57db447088e69d791b6f302b322d.doc windows office2003
ThisDocument