Behavioral task
behavioral1
Sample
abf23ed0a0e8c914be2306c5b9f00c69d2dd04c3204a96b6300255e7af5c439d.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
abf23ed0a0e8c914be2306c5b9f00c69d2dd04c3204a96b6300255e7af5c439d.doc
Resource
win10v2004-20221111-en
General
-
Target
abf23ed0a0e8c914be2306c5b9f00c69d2dd04c3204a96b6300255e7af5c439d
-
Size
195KB
-
MD5
07523de32e43f67b1bbd5edc87803d5c
-
SHA1
75716b230b3c2b61f1d1d57b8402df0ca9ba0bf2
-
SHA256
abf23ed0a0e8c914be2306c5b9f00c69d2dd04c3204a96b6300255e7af5c439d
-
SHA512
98d48dac83e8c5c4522f084edf2c57389c0346307be453b57ea680fc92c7c86b9e0e060dd1940e2f59ee40973fe5ef1bc8a153fe98721ea06809371ab29f54ba
-
SSDEEP
6144:f6bftnhtVSWC498JzP7HsqakRTfcF+2x:CnhtVEgwzP7HzHfeJx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
abf23ed0a0e8c914be2306c5b9f00c69d2dd04c3204a96b6300255e7af5c439d.doc windows office2003
ThisDocument
Module1
Module2