Behavioral task
behavioral1
Sample
6ae9689658e2784b8e82bff9e5a48ea6db073ee57cb621669e83f82d89d4ad34.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6ae9689658e2784b8e82bff9e5a48ea6db073ee57cb621669e83f82d89d4ad34.doc
Resource
win10v2004-20230220-en
General
-
Target
6ae9689658e2784b8e82bff9e5a48ea6db073ee57cb621669e83f82d89d4ad34
-
Size
24KB
-
MD5
3d6bfbca37670b12b6af6aa387ecde51
-
SHA1
c9c4f4fcc4adb36e47a66aaa4adf195e32a42275
-
SHA256
6ae9689658e2784b8e82bff9e5a48ea6db073ee57cb621669e83f82d89d4ad34
-
SHA512
ff4d303a12887db63e4b12a14ebd2b25936e673c269c14e3b9c3ee30ec9822359a87e537bc9e041f60a6f1700a324f427efe00d241ee2ac2e912465d8f7766b5
-
SSDEEP
192:gN2DFK3rcd5kM7f+ihdCSWiu0FPr3EiRcx+NSH76eZYP0ckBCecUfNypHBfpPfkj:vfekfzzWi/VNVeZe0c4gUcphh
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
6ae9689658e2784b8e82bff9e5a48ea6db073ee57cb621669e83f82d89d4ad34.doc windows office2003