Behavioral task
behavioral1
Sample
819d5cab86bbb85ae28f6801705098cf679b3398e9e5d5bc30d6a8a4912b4be3.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
819d5cab86bbb85ae28f6801705098cf679b3398e9e5d5bc30d6a8a4912b4be3.doc
Resource
win10v2004-20221111-en
General
-
Target
819d5cab86bbb85ae28f6801705098cf679b3398e9e5d5bc30d6a8a4912b4be3
-
Size
62KB
-
MD5
52b11d6cd39c8ea9744655d191292cd6
-
SHA1
e3a3fa7e30d24552f5ccd64f62f241be520e165e
-
SHA256
819d5cab86bbb85ae28f6801705098cf679b3398e9e5d5bc30d6a8a4912b4be3
-
SHA512
4c0b976c931b5f544bb8ad5cf8eabfacc476763b2decf936de9761b504875c2313b5c9bdbaf080358789142ff9f954bf82e2f636f451495f62eeafcb06768d10
-
SSDEEP
768:eP4Y0XRqAPohDmW4hemHOVnt4w84UrmSjXgbbKi3tji7jP:cAqAPohzfV
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
819d5cab86bbb85ae28f6801705098cf679b3398e9e5d5bc30d6a8a4912b4be3.doc windows office2003