Behavioral task
behavioral1
Sample
c89815a5f2d48e19d44b5878b334b10054e9b67d731e8810cde1c5fabf8ce377.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c89815a5f2d48e19d44b5878b334b10054e9b67d731e8810cde1c5fabf8ce377.doc
Resource
win10v2004-20220812-en
General
-
Target
c89815a5f2d48e19d44b5878b334b10054e9b67d731e8810cde1c5fabf8ce377
-
Size
64KB
-
MD5
016d3c6bc04fa27f9c5727d263364295
-
SHA1
40d2a6275f0ae17c8a73e15269d8590b44b70007
-
SHA256
c89815a5f2d48e19d44b5878b334b10054e9b67d731e8810cde1c5fabf8ce377
-
SHA512
2bba189911d0c2cebac2056756f873a0aab24cea14b592f6579e06cfc78986ceb82b03dd3f25bf7bcc154f5363e2a83b1ff0442207c2a45983da39b5c9ca0ef1
-
SSDEEP
768:LKAPoI71oVjws4aci9lQeygnEIlMyP+y2ygFq:+APoPV0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
c89815a5f2d48e19d44b5878b334b10054e9b67d731e8810cde1c5fabf8ce377.doc windows office2003