Behavioral task
behavioral1
Sample
07b3284bc17ea667c8239d402a70005150ab005508234f8f4c6e9b11698287c7.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07b3284bc17ea667c8239d402a70005150ab005508234f8f4c6e9b11698287c7.doc
Resource
win10v2004-20221111-en
General
-
Target
07b3284bc17ea667c8239d402a70005150ab005508234f8f4c6e9b11698287c7
-
Size
68KB
-
MD5
4cbc955ea75fa3edff0f73c2ca859119
-
SHA1
d06338832a87c9e44c73ea53bb1e7a429c759fea
-
SHA256
07b3284bc17ea667c8239d402a70005150ab005508234f8f4c6e9b11698287c7
-
SHA512
5c882b1d72cc04d9e1a286ef5050a775c2d4b01e1efd494b780efb1b896baf402b1e5714aa051e54e73524a5aab033b3512a8e98433a96295979c01bb85521fb
-
SSDEEP
768:S+FUmKhx8RMv4GEsjWeaalwIKBYgBlFoJF/7:9KhxxvNEsuRRK1
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
07b3284bc17ea667c8239d402a70005150ab005508234f8f4c6e9b11698287c7.doc windows office2003
ThisDocument