Behavioral task
behavioral1
Sample
7e2166feacba8562d5161450edea738236ddbd6618fa52f395395084777f423c.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e2166feacba8562d5161450edea738236ddbd6618fa52f395395084777f423c.doc
Resource
win10v2004-20220812-en
General
-
Target
7e2166feacba8562d5161450edea738236ddbd6618fa52f395395084777f423c
-
Size
42KB
-
MD5
c1dae51ce47d152842f9c589efc00e1c
-
SHA1
23a3ed71fbde222ad6ff96c1b2cb9a18f98e3337
-
SHA256
7e2166feacba8562d5161450edea738236ddbd6618fa52f395395084777f423c
-
SHA512
35b9b03703f898e31750f27fec5f0754279fa49653d323f1cab15a34cd6a415245de5608b51ba60018b1ca4d0ab3940bcc60e32ef87bf05c44c65bf7079a313d
-
SSDEEP
384:/Kzq5bITHWKBmiSZfI/PKRBTAmuhtuBT80zX0jHPU:75b2BmAPoxAmuS8KQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7e2166feacba8562d5161450edea738236ddbd6618fa52f395395084777f423c.doc .vbs windows office2003