Behavioral task
behavioral1
Sample
473cf67958b76e23b1fcdd1d224483875d458150828c60def8901a54eb235636.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
473cf67958b76e23b1fcdd1d224483875d458150828c60def8901a54eb235636.doc
Resource
win10v2004-20230220-en
General
-
Target
473cf67958b76e23b1fcdd1d224483875d458150828c60def8901a54eb235636.doc
-
Size
99KB
-
MD5
5c1adec3ee58d9489606b7072e65c756
-
SHA1
26d59932b9d295e9885e58d5ab67df2665243017
-
SHA256
473cf67958b76e23b1fcdd1d224483875d458150828c60def8901a54eb235636
-
SHA512
a26b23739a848d2d94d2b7ad83ac193f402022b7b584447ca21716fbae826712d7a527a2a97d053b4f508862f6e11bb6012fbb69bdd7fec8000efa5683ed6bfa
-
SSDEEP
768:2rAXp2M3ga63jNqP+aRNUh0Z86XajXYM/FcYo10JDMxz99F6ubU/qj2SdVn:2r+QbjN8zPUaSWIX7bo0DM33LbBd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
473cf67958b76e23b1fcdd1d224483875d458150828c60def8901a54eb235636.doc.doc windows office2003