Behavioral task
behavioral1
Sample
c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4.docx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4.docx
Resource
win10v2004-20221111-en
General
-
Target
c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4.docx
-
Size
55KB
-
MD5
9336c84d9d860aae3cf5e970043dbc3c
-
SHA1
5e762e639478a920d9ea83b3dbbe45cf112c5619
-
SHA256
c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4
-
SHA512
f808c187943f9306e90630f0a967091c536456adf5f5c36fd507a71b1d2db994f65275d75123bfdb1a6f458a9a410649d55558c13e86f7aac3a97443db59867b
-
SSDEEP
768:2Vxw+tMyD4xzz997ELi+pf8Q3d97rqNHj4cbhVkRv5zJFr2z3p8rltFDawtxNjYp:yxrtnD4nqi+pfVd97cpz3utFD5u
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
c94a871f160afd085d95fd08ebd4d03e502be73776a175402ab4e6a85c006bd4.docx.doc .docx windows office2003