Behavioral task
behavioral1
Sample
a49ae9a2ac9ce330db6a2dd480c129fa7206392262e64d4433f2c7f35cda28a9.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a49ae9a2ac9ce330db6a2dd480c129fa7206392262e64d4433f2c7f35cda28a9.doc
Resource
win10v2004-20230221-en
General
-
Target
a49ae9a2ac9ce330db6a2dd480c129fa7206392262e64d4433f2c7f35cda28a9
-
Size
201KB
-
MD5
f0c64ca95b183fe9dd9a69631029ac13
-
SHA1
34547a5c6d7e9eb675b8e3fb810b36a0ed62213b
-
SHA256
a49ae9a2ac9ce330db6a2dd480c129fa7206392262e64d4433f2c7f35cda28a9
-
SHA512
19b6419e698a19fd626ba24b7086467b7d262314ea410a99656aa45c7355311507f9625498b736db11100a4e898d723a8c27244987099e75a8c931510eea4355
-
SSDEEP
3072:tYAYyVlI23Etx/4DeJxD0QU+5c/18dJ95R3s14Mzgpq:qAXatZxh0QHg8dJ9r3dMzgQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a49ae9a2ac9ce330db6a2dd480c129fa7206392262e64d4433f2c7f35cda28a9.doc windows office2003
ThisDocument
Module1