Behavioral task
behavioral1
Sample
abe5cc6adcdb14c016f92b5715a13ff5766ef321b009f9894c5c1ddaa0cc8a64.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abe5cc6adcdb14c016f92b5715a13ff5766ef321b009f9894c5c1ddaa0cc8a64.doc
Resource
win10v2004-20221111-en
General
-
Target
abe5cc6adcdb14c016f92b5715a13ff5766ef321b009f9894c5c1ddaa0cc8a64
-
Size
106KB
-
MD5
981994c0b2256700fb0239d0d218a598
-
SHA1
f0debc35cc9cf45e60217562d892279635192715
-
SHA256
abe5cc6adcdb14c016f92b5715a13ff5766ef321b009f9894c5c1ddaa0cc8a64
-
SHA512
37f1be4fa8d429c1e0ff0008fff715a12cceec0b1060f6159e40a1e940c286bdeb40e53a26e3d8ef21b04103a7a30c705a4ef655647705d4d7ffdcf32c6daf00
-
SSDEEP
3072:hNZDB+82whrfZ9PyLoY6WPRRYHjpUgPlBoo9PavMqm1YmbppLhGzD:hXDB+8X9Cvmp4v
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
abe5cc6adcdb14c016f92b5715a13ff5766ef321b009f9894c5c1ddaa0cc8a64.doc .vbs windows office2003