Behavioral task
behavioral1
Sample
b1391434dc85797b0528e3bac0e91be3b74e58c260223b263381b11d8cfdebe1.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b1391434dc85797b0528e3bac0e91be3b74e58c260223b263381b11d8cfdebe1.doc
Resource
win10v2004-20220812-en
General
-
Target
b1391434dc85797b0528e3bac0e91be3b74e58c260223b263381b11d8cfdebe1
-
Size
29KB
-
MD5
c28779b3437b4789a40492ce4256dda7
-
SHA1
9d68001717c7ee62efac144261a8c7de02a5fdaf
-
SHA256
b1391434dc85797b0528e3bac0e91be3b74e58c260223b263381b11d8cfdebe1
-
SHA512
bf38590a5d7e2d195a68b13aed5736236fe28a85becc2de44a75de9ff61de6cac3e6169ce6f28a0a6ecae05576ce672c1bd5854bc45394647f709535723336f0
-
SSDEEP
384:uCFPT9oE5+8+QtBF45A2ITKutfanrCMh0jz:X6pA2IMu60
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b1391434dc85797b0528e3bac0e91be3b74e58c260223b263381b11d8cfdebe1.doc .vbs windows office2003