Behavioral task
behavioral1
Sample
75f2ffafe42bd1b3d4220b29774f9f7e62ddf2c64388fc23cb463f1dd39ee873.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
75f2ffafe42bd1b3d4220b29774f9f7e62ddf2c64388fc23cb463f1dd39ee873.doc
Resource
win10v2004-20221111-en
General
-
Target
75f2ffafe42bd1b3d4220b29774f9f7e62ddf2c64388fc23cb463f1dd39ee873
-
Size
98KB
-
MD5
8eafdebc3edeea91256d7de69b85c01a
-
SHA1
e26f1d4dd471469e5a3d502ce4217dfc19e30589
-
SHA256
75f2ffafe42bd1b3d4220b29774f9f7e62ddf2c64388fc23cb463f1dd39ee873
-
SHA512
a8ed34f85cac79bdcb8858a4492feb6f1daabd74d8f2b50cf01f50e5a48fa59405942dba97e5cb43c9c0b4373a6b459aa0fe321692d5de29570eaa700c74c393
-
SSDEEP
768:aU7v4gJqEmIHyrXXbmMDnAXkFBnr1YkpMJiqKQM5/yE9LXIkL1scxvbUgP5hA9Gw:/FW3r8AXP5TAPoUEA67/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
75f2ffafe42bd1b3d4220b29774f9f7e62ddf2c64388fc23cb463f1dd39ee873.doc windows office2003