Behavioral task
behavioral1
Sample
a10675985367355bcd2fa134989b9532db7b09d304f71f27b7376de180de0a20.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a10675985367355bcd2fa134989b9532db7b09d304f71f27b7376de180de0a20.doc
Resource
win10v2004-20220901-en
General
-
Target
a10675985367355bcd2fa134989b9532db7b09d304f71f27b7376de180de0a20
-
Size
60KB
-
MD5
6d2842a1d3587f80de1d91a4574d3647
-
SHA1
9de01e67e40f541b0e7327c3a50697f60e47ce3c
-
SHA256
a10675985367355bcd2fa134989b9532db7b09d304f71f27b7376de180de0a20
-
SHA512
3142672f9a3668fb2604db2191ccb4c5e2dc2ded7ac0e2102f0ad242589f48d56075a753c73d2dc26636c31a431fe8bba7d9541cdad283e1ee6702b69d871869
-
SSDEEP
768:rgqQx24pRsPMhsS9DWhqixw+d5hYe5wAPojQroA+wT:sqQx6usS9aJxwAvwAPos
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a10675985367355bcd2fa134989b9532db7b09d304f71f27b7376de180de0a20.doc .vbs windows office2003