Behavioral task
behavioral1
Sample
764a598a97085020764f46314a36b113080e4191c62f8e3dc9cd769520d807c1.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
764a598a97085020764f46314a36b113080e4191c62f8e3dc9cd769520d807c1.doc
Resource
win10v2004-20220812-en
General
-
Target
764a598a97085020764f46314a36b113080e4191c62f8e3dc9cd769520d807c1.doc
-
Size
51.3MB
-
MD5
3510590280406fa30eda94b3ae39058d
-
SHA1
e350708d48e66cb754adf1190ead9abc050131d9
-
SHA256
764a598a97085020764f46314a36b113080e4191c62f8e3dc9cd769520d807c1
-
SHA512
d1b65d4005b0b01f500c3fd5b97d37db0ba7572eacc10598e0112e1bbbbfc0847c37101c29ca2f7a661c59c0eaeab2f4984c8507ffe68c5a9aad618c11e628c5
-
SSDEEP
49152:WsQXkAW3C2hUdN/MX4vqaBweZ5aQ0Y/QdXYTCmUkFOf3hETCmUkFOf3i:TYCkDCkh
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
764a598a97085020764f46314a36b113080e4191c62f8e3dc9cd769520d807c1.doc.doc .eml office
ThisDocument