Behavioral task
behavioral1
Sample
be88762d3647a02e85aaa61c8e78252f09dec7ae7b043dac60906ea428e06620.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be88762d3647a02e85aaa61c8e78252f09dec7ae7b043dac60906ea428e06620.doc
Resource
win10v2004-20220812-en
General
-
Target
be88762d3647a02e85aaa61c8e78252f09dec7ae7b043dac60906ea428e06620
-
Size
76KB
-
MD5
7965821ac0da8becf2aa687e57b41302
-
SHA1
94b9e43e20eea3ddfe373f09f79fe65567c5dfcc
-
SHA256
be88762d3647a02e85aaa61c8e78252f09dec7ae7b043dac60906ea428e06620
-
SHA512
61e49db0522aa7d9d7fb24e5cebc2d49a1b7ba911db623a365ac7f24e4e9b9cd74ac89d4850fe735485e07121dd623e596d62eb20f87dd4474f1c147efb78cc8
-
SSDEEP
768:Fj9H9lUW/Mnooto7IsmvBNzdrDR94L+YCp+FVnCvEHB1+Z3T5JD8xz99xMCb:Z9daWX7gNzdr908p+FVCvEHWD5JD839
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
be88762d3647a02e85aaa61c8e78252f09dec7ae7b043dac60906ea428e06620.doc windows office2003
ThisDocument