Behavioral task
behavioral1
Sample
2245ac73c2481b1cc4b16125532994b04bcd45c14846791653f057b3c99ba61d.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2245ac73c2481b1cc4b16125532994b04bcd45c14846791653f057b3c99ba61d.doc
Resource
win10v2004-20230220-en
General
-
Target
2245ac73c2481b1cc4b16125532994b04bcd45c14846791653f057b3c99ba61d.doc
-
Size
2.0MB
-
MD5
9c870da344e9e9e8fc43ed6887f0a7e2
-
SHA1
a1ea71ba3d79a8367a35354feae72d30688295f2
-
SHA256
2245ac73c2481b1cc4b16125532994b04bcd45c14846791653f057b3c99ba61d
-
SHA512
cfaa399ab69946247bef940ec2ac9a274791b0ef40808a8c733081c86b4247eac2e731beee61204b4433b15b32869c67fadd233b0761ad73829b5fb8ce2b3b46
-
SSDEEP
1536:I/IjMkBc1V2AzSF6VxRr8RGg1DRFp15miGlvQ79wpvj2SZzcGjBAwVvun7WTwx09:8cM3V2Aze6VxlJg1H
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2245ac73c2481b1cc4b16125532994b04bcd45c14846791653f057b3c99ba61d.doc.doc windows office2003
ThisDocument
faltf
solidf