Behavioral task
behavioral1
Sample
4c8a8e5b785534584e6b34bbad989b987f9ca1e775d5fcc8542b637be7a57647.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c8a8e5b785534584e6b34bbad989b987f9ca1e775d5fcc8542b637be7a57647.doc
Resource
win10v2004-20220812-en
General
-
Target
4c8a8e5b785534584e6b34bbad989b987f9ca1e775d5fcc8542b637be7a57647
-
Size
91KB
-
MD5
6aa719b3139c116b698a0301353730ef
-
SHA1
a16d40091b96aad02b56c93be840624798920aec
-
SHA256
4c8a8e5b785534584e6b34bbad989b987f9ca1e775d5fcc8542b637be7a57647
-
SHA512
cd41162a9ab12d5107b4210f33ea4595eeec857244da51e9aa095a6c71fce26986295a2c8fe68d4dd4395f87f1548211b01f49934a3fce5c70f090c2f3e8d483
-
SSDEEP
768:u9nA7UKF6qH2sYzyTrZ0c9eDUxz99dA3QDiHRm7kJx90SWuEilvRt3B2XpyHQiVJ:EKfRYyF0c9eDU3s3QSWEN4XkwiA49h
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4c8a8e5b785534584e6b34bbad989b987f9ca1e775d5fcc8542b637be7a57647.doc windows office2003
ThisDocument
Module3
Module4
Module1