Behavioral task
behavioral1
Sample
d4b792082b883e4f97042fee435e7c0a1585f9d75aecedd109ee55fe495a610f.dotm
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d4b792082b883e4f97042fee435e7c0a1585f9d75aecedd109ee55fe495a610f.dotm
Resource
win10v2004-20221111-en
General
-
Target
d4b792082b883e4f97042fee435e7c0a1585f9d75aecedd109ee55fe495a610f.doc
-
Size
1012KB
-
MD5
5542d1b2df2160e618e0468505a864b4
-
SHA1
99f6279a5266be7ef3d8ee8ca8271e237f3cbe4c
-
SHA256
d4b792082b883e4f97042fee435e7c0a1585f9d75aecedd109ee55fe495a610f
-
SHA512
af2791bf37d98b99b8c4ba2d8de5d5c1c6f70449a0f2846c9c647e8d52a7d88b34751fa2c7f215b3a24dbbbc04d214cd40ce2d74a31fe987059c4a1abccac57d
-
SSDEEP
24576:vzezsRrBkzTCWm+vUZTUSzBdKo1Sv/AW7F3kLykQy2mX0UXw:vzZZGzThgQSyo+RVkVfw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
d4b792082b883e4f97042fee435e7c0a1585f9d75aecedd109ee55fe495a610f.doc.dotm .doc office2007