Behavioral task
behavioral1
Sample
85348795f1e4133a934f760a8a61fa0de9ac2b5f45d28ca471a08203de7bf3aa.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
85348795f1e4133a934f760a8a61fa0de9ac2b5f45d28ca471a08203de7bf3aa.doc
Resource
win10v2004-20220812-en
General
-
Target
85348795f1e4133a934f760a8a61fa0de9ac2b5f45d28ca471a08203de7bf3aa
-
Size
58KB
-
MD5
f21ac3c32bca823109f470a9dbc1cc09
-
SHA1
c8c571b3629dfcc7ec746c49119bfe99fd20dae2
-
SHA256
85348795f1e4133a934f760a8a61fa0de9ac2b5f45d28ca471a08203de7bf3aa
-
SHA512
a10c6ea1c9295aff209de67139b5a736a0d72dc16782d989a1b224da358203c011113e7c7940ef711eb87b391c0562f918c10089f3586cb3242c9714896a7e82
-
SSDEEP
768:/QwkTTAPolUtq8e5uxT8H/uZSyUYcRy1kA:owkTAPoStmM18H/C/2
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
85348795f1e4133a934f760a8a61fa0de9ac2b5f45d28ca471a08203de7bf3aa.doc .vbs windows office2003