Behavioral task
behavioral1
Sample
970a8d8300169113f31e91bf7abc9fe2aa9985ced5ca79a6af3351d837999b46.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
970a8d8300169113f31e91bf7abc9fe2aa9985ced5ca79a6af3351d837999b46.doc
Resource
win10v2004-20220812-en
General
-
Target
970a8d8300169113f31e91bf7abc9fe2aa9985ced5ca79a6af3351d837999b46
-
Size
45KB
-
MD5
d4215c4ee2f36070142b893004d2bd1d
-
SHA1
ca57315579207a8fd4e82f67f2696f5107b13922
-
SHA256
970a8d8300169113f31e91bf7abc9fe2aa9985ced5ca79a6af3351d837999b46
-
SHA512
d69b1516b58a4af50d25dcfd686f6f3e55c5c47189d5596c625892bf4b763b91a6c623cbcd957e03928229aa8a9872656076f84fefc20c3a95281372428f112a
-
SSDEEP
384:B6UAj2MQI/GniDxWXar4RUiSZfI/PKRReAquhtp09OfX0jz:B6UAj2MQIeni9WXar4RQAPocAq9UY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
970a8d8300169113f31e91bf7abc9fe2aa9985ced5ca79a6af3351d837999b46.doc .vbs windows office2003