Behavioral task
behavioral1
Sample
64e9430f749b369ebf70dcb956184ceef2a4485a8a52dbd0588876ff4c03fd21.doc
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
64e9430f749b369ebf70dcb956184ceef2a4485a8a52dbd0588876ff4c03fd21.doc
Resource
win10-20230220-en
General
-
Target
64e9430f749b369ebf70dcb956184ceef2a4485a8a52dbd0588876ff4c03fd21
-
Size
536.3MB
-
MD5
cac7d82cb342a14d253fad705e1bc7ff
-
SHA1
d032e234058ebb216107e1f8bcc33cf49b416fe1
-
SHA256
64e9430f749b369ebf70dcb956184ceef2a4485a8a52dbd0588876ff4c03fd21
-
SHA512
aa48c667dab1a5d4b02f5799ea9090b7c061ec1fb7cb2b8517612c86180c6bf2c4338ab0f1a59dd1079c0cf3367a1e7837f705e5006e7ac7101eb17745bdff85
-
SSDEEP
6144:ip32/gDd0Nmt71wFmSWjfDrV8YQnZocbyrX4NqclWL9:ip32SEmtJwFmhjfPtrXqqyW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
64e9430f749b369ebf70dcb956184ceef2a4485a8a52dbd0588876ff4c03fd21.doc windows office2003
ThisDocument
Module1