Behavioral task
behavioral1
Sample
0663c87b796c01fc839ab0d169701d13d3feee0556347e09c088fbf43c7f20ea.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0663c87b796c01fc839ab0d169701d13d3feee0556347e09c088fbf43c7f20ea.doc
Resource
win10v2004-20230220-en
General
-
Target
0663c87b796c01fc839ab0d169701d13d3feee0556347e09c088fbf43c7f20ea
-
Size
532.3MB
-
MD5
ac93db48d64557d335d318ce355ea4de
-
SHA1
fa241a115d1a08ead7bd699a4e7723bb56817db4
-
SHA256
0663c87b796c01fc839ab0d169701d13d3feee0556347e09c088fbf43c7f20ea
-
SHA512
6b15215d8a8cf278ca4e9b18ca0a9e7183e880fe38a42175b8f546380a41393009e4dbd8e64ac76b79913534a1e9daaa62d7d4c40482c75adb3373fe5a339658
-
SSDEEP
6144:xPn4VZXbatu7MDogsDkHS50LdfcGcbz1f5M9KTFrMpSlMK3Ru+Q28:xP4PbNMkgg3Ru+x
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0663c87b796c01fc839ab0d169701d13d3feee0556347e09c088fbf43c7f20ea.doc windows office2003
ThisDocument
Module1