Behavioral task
behavioral1
Sample
0ee32e3ea3d83da9df6317d7c8c539f0f3622af82ef242d74fdca1e5d4ee427f.docx
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0ee32e3ea3d83da9df6317d7c8c539f0f3622af82ef242d74fdca1e5d4ee427f.docx
Resource
win10v2004-20230220-en
General
-
Target
9f7c280b20d021f0a0984d1ad0aeba41.bin
-
Size
26KB
-
MD5
f3c7c3baa34c37ef9d92936c551a4d30
-
SHA1
e707694a0d6fa29f8cccdccfc0a9ed305c52ec44
-
SHA256
1d0e025c5929ddb582f9a1e7122cbaee25c96c17905cd4651a472de154c8c87d
-
SHA512
ace74a9701a65b5a8a1933827a67c4051798ca8c0632f278bfaab6afe8a8fb959d3b1ac550bc588db7e665eb33ad85807cefd662148fe5695fc7ba5532404d08
-
SSDEEP
768:XEwhe8AVMTbkYj/4d4B8qKy1c5wN5VaKe:XEwhLNbkrwb1c50Gp
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/0ee32e3ea3d83da9df6317d7c8c539f0f3622af82ef242d74fdca1e5d4ee427f.docx office_macro_on_action -
Processes:
resource static1/unpack001/0ee32e3ea3d83da9df6317d7c8c539f0f3622af82ef242d74fdca1e5d4ee427f.docx
Files
-
9f7c280b20d021f0a0984d1ad0aeba41.bin.zip
Password: infected
-
0ee32e3ea3d83da9df6317d7c8c539f0f3622af82ef242d74fdca1e5d4ee427f.docx.doc .docx windows office2003
ThisDocument
Class1