Behavioral task
behavioral1
Sample
e6209da8f4517e28f9a7bddfd673cb898a6de05c5007f6d12cd8ea2b0137964d.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e6209da8f4517e28f9a7bddfd673cb898a6de05c5007f6d12cd8ea2b0137964d.doc
Resource
win10v2004-20221111-en
General
-
Target
e6209da8f4517e28f9a7bddfd673cb898a6de05c5007f6d12cd8ea2b0137964d
-
Size
97KB
-
MD5
103b509ae042c758dee0270027e5b1b7
-
SHA1
8f5ad162f8b38ad6c6541cebf39bf06c1dc7e322
-
SHA256
e6209da8f4517e28f9a7bddfd673cb898a6de05c5007f6d12cd8ea2b0137964d
-
SHA512
024e466f3edd5aa8b96b489f23d2652adb91f00154dc1184898cba07b2be0b49e0b5b61a6818e5fd637e7d5be8774c6b297720cdabec0ceb17dd2d9763feec24
-
SSDEEP
768:L8xual1FXgWqUe4mM10APo60XugnrjlT8TchVmXyW:elTneAPo60eOWJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
e6209da8f4517e28f9a7bddfd673cb898a6de05c5007f6d12cd8ea2b0137964d.doc windows office2003