Behavioral task
behavioral1
Sample
02a02fb57d6bcc15f56ad7599b18a3244f9297f92fb56781e2262869165579c4.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
02a02fb57d6bcc15f56ad7599b18a3244f9297f92fb56781e2262869165579c4.doc
Resource
win10v2004-20220901-en
General
-
Target
02a02fb57d6bcc15f56ad7599b18a3244f9297f92fb56781e2262869165579c4
-
Size
87KB
-
MD5
17f549d851f4dfc73fcd34604b5b28fb
-
SHA1
6f1411ef69f964bea50c612c074124f53c89c39f
-
SHA256
02a02fb57d6bcc15f56ad7599b18a3244f9297f92fb56781e2262869165579c4
-
SHA512
f7bdeb7545cf9c0ab9be7aa6cf48485c4955d8567733f675af6de141361290f5546fb07d5463b6c9a6ca23aa62dad9d0be913b10efc0719d24bbfbd4112c3d41
-
SSDEEP
768:BcZynmt1g9O8H7kghIY7dL7UHKh6XcMUD5iEYDD5IJN41I:iZXfgo8HmYdc4MUD0RdSN4W
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
02a02fb57d6bcc15f56ad7599b18a3244f9297f92fb56781e2262869165579c4.doc windows office2003
ThisDocument
Module2
Module1
Module3