Behavioral task
behavioral1
Sample
5c0ae52d0eef3074b50780e70a75e955bd17af14030beb8bade1969af4f6a855.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5c0ae52d0eef3074b50780e70a75e955bd17af14030beb8bade1969af4f6a855.doc
Resource
win10v2004-20230220-en
General
-
Target
5c0ae52d0eef3074b50780e70a75e955bd17af14030beb8bade1969af4f6a855
-
Size
90KB
-
MD5
47eda28c62c840c4cbfecace0ba0ca78
-
SHA1
20678c5ca1cad6a1bcb70f7901abec8dd04722a7
-
SHA256
5c0ae52d0eef3074b50780e70a75e955bd17af14030beb8bade1969af4f6a855
-
SHA512
fad3c1e00f27df183b1dc4fb12f9fda4c40668c6eccfd11704ebc9a41c74bf53ef83cdffd2b1cfb779197a9ea5216cdd1d030fcb502cd2d4d6e6df94c76eb2e1
-
SSDEEP
1536:K1UK7SNq8fzKcM+IZvg9fIv6N1jKweagizfJbnsNxRV:K1UK7J+G4fNEnaxfJLKd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
5c0ae52d0eef3074b50780e70a75e955bd17af14030beb8bade1969af4f6a855.doc windows office2003