Behavioral task
behavioral1
Sample
0f4da5659428e5d056b9c9c7c3d40064d8b719a7c5b27af422c4665952224e89.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0f4da5659428e5d056b9c9c7c3d40064d8b719a7c5b27af422c4665952224e89.doc
Resource
win10v2004-20220812-en
General
-
Target
0f4da5659428e5d056b9c9c7c3d40064d8b719a7c5b27af422c4665952224e89
-
Size
45KB
-
MD5
1f9a50d8bd199df4ba6651fb260cf9d7
-
SHA1
832cce0a44d064fce1469142715f45be864d6cc7
-
SHA256
0f4da5659428e5d056b9c9c7c3d40064d8b719a7c5b27af422c4665952224e89
-
SHA512
52c6d50580c824dfa386c30b66cd582e377739939216e4b89ccfaf8bc0bcdff82f06a82893df9532e09a4b7039eb02e53702c8350fa0cef6557ad0b430ed9c0c
-
SSDEEP
384:A9GPkgbwu1iSZfI/PKRO34pi9lt5q2On0GJnvj3INg+xc+o4M60jTYk3td/+:Nbw+APoOjX3G0GJnsNK+ok4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
0f4da5659428e5d056b9c9c7c3d40064d8b719a7c5b27af422c4665952224e89.doc windows office2003