Behavioral task
behavioral1
Sample
92e9880a66451b37177424d673aa30bd5428fd1722bcae8ea02c29c2e82a9cdb.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92e9880a66451b37177424d673aa30bd5428fd1722bcae8ea02c29c2e82a9cdb.doc
Resource
win10v2004-20221111-en
General
-
Target
92e9880a66451b37177424d673aa30bd5428fd1722bcae8ea02c29c2e82a9cdb
-
Size
67KB
-
MD5
7c5ded588b626d382e7bfeaa1b77a9e3
-
SHA1
e19592e505a178c627b41b863a2c3b2ca9bdfacc
-
SHA256
92e9880a66451b37177424d673aa30bd5428fd1722bcae8ea02c29c2e82a9cdb
-
SHA512
eaa93ee20e463b942a89af9c70a1b33e3f377cb7292a0984bc0468566f40d0ef95228af45dc1607d922f351f973dccc05a2827f2f36a0b7ba038c48458925071
-
SSDEEP
768:8ScI8M4Cie7UdaOvsDcAPoZAKNLP0A/XD3xz99R3cla:8pxM4Cie7UdaOvsDcAPo/NLfvD33r
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
92e9880a66451b37177424d673aa30bd5428fd1722bcae8ea02c29c2e82a9cdb.doc .vbs windows office2003