Behavioral task
behavioral1
Sample
a69ed41a6b45bf1362badeb1ccbbc2e8287f5d9a89b81030e69268cca0d68fcf.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a69ed41a6b45bf1362badeb1ccbbc2e8287f5d9a89b81030e69268cca0d68fcf.doc
Resource
win10v2004-20221111-en
General
-
Target
a69ed41a6b45bf1362badeb1ccbbc2e8287f5d9a89b81030e69268cca0d68fcf
-
Size
55KB
-
MD5
5742195f1e378adf6da5bf2806c240f0
-
SHA1
8d7535eb48a1e1be0375a6911d84a9ee82d7e072
-
SHA256
a69ed41a6b45bf1362badeb1ccbbc2e8287f5d9a89b81030e69268cca0d68fcf
-
SHA512
97c5ff579d9751e3929408283e60686be7073526fc0f1babdaf4c728a2b8858d40387d8b4ba923f3cf1e5624692978a62935198d5e7a115fe01549ffb5e76d91
-
SSDEEP
384:4aXsK+I4wWcHx8iSZfI/PKRTiEtDRxvVJ4tFOm8Mity0wrgeZFRPaIR+X0jHIyb:FXsK+I4lcHxIAPorF/vM2yXsUK3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a69ed41a6b45bf1362badeb1ccbbc2e8287f5d9a89b81030e69268cca0d68fcf.doc .vbs windows office2003