Behavioral task
behavioral1
Sample
5364f09b210ef27d9ef932257f1eb646b42962701c9bb6b7832a1bc95bc47f3f.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5364f09b210ef27d9ef932257f1eb646b42962701c9bb6b7832a1bc95bc47f3f.doc
Resource
win10v2004-20220812-en
General
-
Target
5364f09b210ef27d9ef932257f1eb646b42962701c9bb6b7832a1bc95bc47f3f
-
Size
37KB
-
MD5
2e432e098003285cfb5d30c59650cc06
-
SHA1
e70e78b00d34d289d494c1032567ce266396f1cb
-
SHA256
5364f09b210ef27d9ef932257f1eb646b42962701c9bb6b7832a1bc95bc47f3f
-
SHA512
5a78ae278c10a4fb38611e721e951993a45c581b62415db224b6e741f7a0a200456e4416b498284f770692946c98a3f5506ade775b261b4794569fa426c45c16
-
SSDEEP
192:hllZMoYd6a4v6e6/6rZfI/vXKaqkQ+AsIbd3hzb2+xCGEhYX0jL6wgL5t+nCKVEa:coY+iSZfI/PKRkQ7KbhYX0jLkteC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
5364f09b210ef27d9ef932257f1eb646b42962701c9bb6b7832a1bc95bc47f3f.doc .vbs windows office2003