Behavioral task
behavioral1
Sample
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm
Resource
win10v2004-20230220-en
General
-
Target
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm.zip
-
Size
754KB
-
MD5
2c3115cfb821128da25116c1e0e360a4
-
SHA1
a51e7e761d6d5295a098c8f244ec26ee3d291485
-
SHA256
a43c19e8670c125324cb19f04b6c7814b07c7eec2bc45e727dddbe2da2966858
-
SHA512
4d17b6d7ab846777e8bd4c7aca0ee4028487623c75a43ebeb06d1d96d61ffc0950d0d8caacf4daf4879934c35b39d53465f68ec51d77a25a47112fc27d30e655
-
SSDEEP
12288:YNHsC8dE4oG8gWRs7BSuP0wcPdlpednepsYlCArE7J0w3QQ5/qSO/2zrSngTupQB:cHwoGRXBS8cllpeI/CArE7J0wAM/qSO6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm office_macro_on_action
Files
-
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm.zip.zip
-
17637fac7f989549acd248ca9e5293d2b9a1a2e4bb0f7e4edf5571df35129f0c.docm.docm office2007