Behavioral task
behavioral1
Sample
c843aef07b285a423c504c3229af7acac8150159a6794d9c4f012688fc3926a2.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c843aef07b285a423c504c3229af7acac8150159a6794d9c4f012688fc3926a2.doc
Resource
win10v2004-20221111-en
General
-
Target
c843aef07b285a423c504c3229af7acac8150159a6794d9c4f012688fc3926a2
-
Size
37KB
-
MD5
e32633b2e0da8bd2c5d209277029f6b8
-
SHA1
1f59cf0dc44f0e29643c87c5af726d942e4669dc
-
SHA256
c843aef07b285a423c504c3229af7acac8150159a6794d9c4f012688fc3926a2
-
SHA512
bfe44b9341de9ae128a55eff5415585101e33a4ec613d5dead81546fc1741796b0136f5a1b747e8e7980b61b8dbdd40ef4463610f86b70ddca08cc74e920732b
-
SSDEEP
384:0CGbiSdJ7U/vNCRDvX0j6OtUBMDybA5hlDQEjGl6r:0nJg9MfyycfFjGl6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
c843aef07b285a423c504c3229af7acac8150159a6794d9c4f012688fc3926a2.doc .vbs windows office2003
ThisDocument
Module1