Behavioral task
behavioral1
Sample
d7f8ae3d2de98b014dd313ee404ec430.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d7f8ae3d2de98b014dd313ee404ec430.doc
Resource
win10v2004-20221111-en
General
-
Target
d7f8ae3d2de98b014dd313ee404ec430
-
Size
12KB
-
MD5
d7f8ae3d2de98b014dd313ee404ec430
-
SHA1
ff530476a30566debf4eecc969c5386b57299c84
-
SHA256
9991f60d520c42e440dc24b301312221b1e301b0fd0e1c07959aec2d077b17e2
-
SHA512
e9fa67e413bec5f30d0928bac4b2f05a010f18e0ec1e7d56ea1384ecc78173647aed2dcc039d33b8cc3737506f08e4e2e08aab281773f01ec7989db513f0b383
-
SSDEEP
96:R+OU1yk4IP8d7fZFBeVLmL9t1OpQqb1vC+X0jonstB37qNutv45uI1Y1trgCQ6cn:8FY7fr4cH1O6qN0jbtFG0tmWkd6Fa
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
d7f8ae3d2de98b014dd313ee404ec430.doc windows office2003
ThisDocument