Behavioral task
behavioral1
Sample
a93281216e4eac91f4df122936142a3c82075a665202c5a2cd7f8cfce5cc7cc0.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a93281216e4eac91f4df122936142a3c82075a665202c5a2cd7f8cfce5cc7cc0.doc
Resource
win10v2004-20221111-en
General
-
Target
a93281216e4eac91f4df122936142a3c82075a665202c5a2cd7f8cfce5cc7cc0
-
Size
68KB
-
MD5
7bfaf508be27a74c23f08b9138992562
-
SHA1
1b9f15cd2ec197a94927461ad77df66479199c72
-
SHA256
a93281216e4eac91f4df122936142a3c82075a665202c5a2cd7f8cfce5cc7cc0
-
SHA512
c883627e417b371836c7da1c77f6f1b1c1c771bc80f0f4e9f1ae0a1528bde30152005e8c5a07e064466f65bf03dd626ca178966c5f00e91171db18bee66feb9b
-
SSDEEP
768:tWMNhQAPoSA8j+hq/AVjuhUrqZWltcVV1DExdCKQ7BSLau:ZgAPoSvK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
a93281216e4eac91f4df122936142a3c82075a665202c5a2cd7f8cfce5cc7cc0.doc windows office2003