Behavioral task
behavioral1
Sample
c1d71d6dfa719c86ca34fbf3b21b210106c3efc9cf98c040b05b60056fc18f53.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c1d71d6dfa719c86ca34fbf3b21b210106c3efc9cf98c040b05b60056fc18f53.doc
Resource
win10v2004-20220901-en
General
-
Target
c1d71d6dfa719c86ca34fbf3b21b210106c3efc9cf98c040b05b60056fc18f53
-
Size
73KB
-
MD5
3c329323f5a2808916719a187e3fefce
-
SHA1
f35dcd1527bc7a8ed22a9f714c9bc6d50fc2bda6
-
SHA256
c1d71d6dfa719c86ca34fbf3b21b210106c3efc9cf98c040b05b60056fc18f53
-
SHA512
1d9600d0e16b50e2c6d2287dacdc743dd1b4b8d6625aff73bf41ce7a466a4cb87cd35ce3b5a62b08ae513ac8c76910c923b34c7dcbb14d5cbd1a14fb119e906b
-
SSDEEP
768:L/ubZULKxqi2G19+7UF+cGTnEi/Ad+hfXbVfGonunj/DDqbNaCVUE6GY:L/uVULKxqfG7AcGTnEBchfXRw/DDSQp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
c1d71d6dfa719c86ca34fbf3b21b210106c3efc9cf98c040b05b60056fc18f53.doc windows office2003
ThisDocument
Module1
Module2
Module3
Module4
Module5
Module6