Behavioral task
behavioral1
Sample
af57e063410a3a561914311368ef7b47565b26324500f4ccb3dc2c35ad77c18c.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af57e063410a3a561914311368ef7b47565b26324500f4ccb3dc2c35ad77c18c.doc
Resource
win10v2004-20220812-en
General
-
Target
af57e063410a3a561914311368ef7b47565b26324500f4ccb3dc2c35ad77c18c
-
Size
51KB
-
MD5
dc3155595889798bcf8b07885c366148
-
SHA1
ac2561718df99280c56f2837d657ef50dcd58fc7
-
SHA256
af57e063410a3a561914311368ef7b47565b26324500f4ccb3dc2c35ad77c18c
-
SHA512
029138f7e418adfbfc8761e7bb02142659d393708c82d1bea6a4e5467836d5e68344176152cffcfdbe28ccc9a48d72bbb156ecd602d5234b6d3a90433aa693fc
-
SSDEEP
768:0QepKqUBFkF/ec32sgc6OAPoWy0U0vOpK:0Qe1UrkeJs4OAPomV
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
af57e063410a3a561914311368ef7b47565b26324500f4ccb3dc2c35ad77c18c.doc windows office2003