Behavioral task
behavioral1
Sample
69ef7c4cb3849283c03eaa593b02ebbfd1d08d25ef9a58355d2a9909678d6c6d.doc
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
69ef7c4cb3849283c03eaa593b02ebbfd1d08d25ef9a58355d2a9909678d6c6d.doc
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
69ef7c4cb3849283c03eaa593b02ebbfd1d08d25ef9a58355d2a9909678d6c6d.doc
Resource
win10v2004-20230220-en
General
-
Target
69ef7c4cb3849283c03eaa593b02ebbfd1d08d25ef9a58355d2a9909678d6c6d.doc
-
Size
91KB
-
MD5
292fbbf7e2ab20b12f4f2c0464a5b774
-
SHA1
d21add8bee4feefe812b0c16a6a541bbdec14263
-
SHA256
69ef7c4cb3849283c03eaa593b02ebbfd1d08d25ef9a58355d2a9909678d6c6d
-
SHA512
7b7d742994458f581c83b82f84dac3f44f41b9d7ad314f19071a563ee699afcc51108fa36a684528ac24f0bde66504830fb939f08d87775af3a4e4d1c1c3e898
-
SSDEEP
1536:Jr42aUVfJyEpYRzHk0IEyJo0XZcQbuVbnhTdNrdQ+cFB0y1:Jk2fVxyEKEzEytcQbuVb1dhdQ1FCE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
69ef7c4cb3849283c03eaa593b02ebbfd1d08d25ef9a58355d2a9909678d6c6d.doc.doc windows office2003
ThisDocument
NewMacros