Behavioral task
behavioral1
Sample
zjgh.zjt.gov.cn_module_download_downfile.jsp_classid=0&filename=7e9be188c7544d10b8b57823253987c1.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
zjgh.zjt.gov.cn_module_download_downfile.jsp_classid=0&filename=7e9be188c7544d10b8b57823253987c1.doc
Resource
win10v2004-20230220-en
General
-
Target
zjgh.zjt.gov.cn_module_download_downfile.jsp_classid=0&filename=7e9be188c7544d10b8b57823253987c1.doc
-
Size
60KB
-
MD5
c9021d148c896c7804050feaf203320f
-
SHA1
851afab8e0e12c8691ca3bec4d1b43ae37f16714
-
SHA256
f9cf289b667d21ff4ee978f8af06440ffd4a58735adfe6f1208778f9011cb786
-
SHA512
b648c906d23765de6d90aeaa14afc28a64569621528f897df302b999229f166ba70285c3afc29ffcb06663773b6a78ae0b04154895bc36880df52a975523093a
-
SSDEEP
768:wGj18eN0APoZ4zozwXDgxz99tLuuu7LIO:wGpCAPoGscDg3nuuu7L
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
zjgh.zjt.gov.cn_module_download_downfile.jsp_classid=0&filename=7e9be188c7544d10b8b57823253987c1.doc.doc windows office2003