Behavioral task
behavioral1
Sample
47958e92c8aafed45c9efd0337e04cff31333f6bc58c8b1fc0233bb12fc1804c.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
47958e92c8aafed45c9efd0337e04cff31333f6bc58c8b1fc0233bb12fc1804c.doc
Resource
win10v2004-20220812-en
General
-
Target
47958e92c8aafed45c9efd0337e04cff31333f6bc58c8b1fc0233bb12fc1804c
-
Size
75KB
-
MD5
580d0aab986582e798859343e31e2019
-
SHA1
68f11d1719e56a1a4c7f5224d01c09b349b1b9ae
-
SHA256
47958e92c8aafed45c9efd0337e04cff31333f6bc58c8b1fc0233bb12fc1804c
-
SHA512
95399d592e839ea4c92a912c5356928d1796eedf899ba3807e56be5c0ea44b96f37728cb6e5a1fe809dcbd118ae519785e3d7d96cd98a4a049e9fa3724a03829
-
SSDEEP
768:DJghX+cpWcb4n3zTuRr/HdMee5PGi32nIzh5MeAR87MZeD8l7Cvna/h1oANlhxHa:ihXS2cRVvxIZXl7Cf++AN7xHb46VUD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
47958e92c8aafed45c9efd0337e04cff31333f6bc58c8b1fc0233bb12fc1804c.doc windows office2003
ThisDocument