Behavioral task
behavioral1
Sample
5c1c8535647700565131dbde6e495900342f7f51373000713f227d6c89e15376.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5c1c8535647700565131dbde6e495900342f7f51373000713f227d6c89e15376.doc
Resource
win10v2004-20220812-en
General
-
Target
5c1c8535647700565131dbde6e495900342f7f51373000713f227d6c89e15376
-
Size
47KB
-
MD5
e36843e84e947921f997af5b696edb07
-
SHA1
2133692d9219d2e16ff2528753158a646ba9f959
-
SHA256
5c1c8535647700565131dbde6e495900342f7f51373000713f227d6c89e15376
-
SHA512
fd1dec5e0758bb89029cf9e9dafbc658d58a0262c3899d189db3b716a1dea546a798dd0346bcf0e3355f26a4d243323254177c06b409e2dd3978be1d01477170
-
SSDEEP
384:qxIV51T8e7FFbiSHuT7UjoaYR12ibAm6QwxE2ndF7GWmc+6+KiAvVaRB3QvuQStp:q+Ffu7ULE2nj7HTjBvuOH8rH
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
5c1c8535647700565131dbde6e495900342f7f51373000713f227d6c89e15376.doc .vbs windows office2003
ThisDocument
Module3
Module5