Behavioral task
behavioral1
Sample
947c7641e172dc80204d8fc130d31a138fb8358ecfd3c95f065af7dd1ee19ff0.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
947c7641e172dc80204d8fc130d31a138fb8358ecfd3c95f065af7dd1ee19ff0.doc
Resource
win10v2004-20220812-en
General
-
Target
947c7641e172dc80204d8fc130d31a138fb8358ecfd3c95f065af7dd1ee19ff0
-
Size
61KB
-
MD5
4036517378b8bd555c5235b4491b5899
-
SHA1
72d2c8ed1740f0fdb5f1b5d03e60f0ab35014e46
-
SHA256
947c7641e172dc80204d8fc130d31a138fb8358ecfd3c95f065af7dd1ee19ff0
-
SHA512
ba6a78305f225fd83a4349a847ad8365d39d51505e7b175f0775c22daf5151aa79edbeeadbd03bf22703191a98a50ce749f5ab588d8c00a8d226e430b81759ff
-
SSDEEP
384:Teq+WD793eXXgLmWReCie7CqYrLmrXdjjjjjjjjjdjjdjjV+jpZiSZfI/PKRe6/8:KEpZRqNVAPoFDd1JYDpxz99I1cry2gQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
947c7641e172dc80204d8fc130d31a138fb8358ecfd3c95f065af7dd1ee19ff0.doc .vbs windows office2003