Behavioral task
behavioral1
Sample
75fcedb3dbed54454afa9637824f19bb311f29f3c99a8fa5f02e8da9df62954b.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
75fcedb3dbed54454afa9637824f19bb311f29f3c99a8fa5f02e8da9df62954b.doc
Resource
win10v2004-20221111-en
General
-
Target
75fcedb3dbed54454afa9637824f19bb311f29f3c99a8fa5f02e8da9df62954b
-
Size
38KB
-
MD5
7037c21d77a887383968ac9d19f0c7b8
-
SHA1
f420e5fe948ef9a5faa4a40c5f28bc39d78a030d
-
SHA256
75fcedb3dbed54454afa9637824f19bb311f29f3c99a8fa5f02e8da9df62954b
-
SHA512
dbb1d121e2e1165302a53d357c9467dd4ccacc7c8527ab0357b84245f1e81c6c8162968ce04e7a8372678591315d73682ddb2a09ce991a6e63d23f6609806736
-
SSDEEP
384:YpJaKTi6dIoIsyOLRPjib4tEaomd+mcXNtyM6UFDyeQsoJZiX0jMC:EFI0RP2zOLcDyCyTWj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
75fcedb3dbed54454afa9637824f19bb311f29f3c99a8fa5f02e8da9df62954b.doc .vbs windows office2003