Behavioral task
behavioral1
Sample
9ac3382b89c40d58a4c8c9d5426b276f9a446944c0ca500fed3126f470c265e7.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9ac3382b89c40d58a4c8c9d5426b276f9a446944c0ca500fed3126f470c265e7.doc
Resource
win10v2004-20230220-en
General
-
Target
9ac3382b89c40d58a4c8c9d5426b276f9a446944c0ca500fed3126f470c265e7.doc
-
Size
182KB
-
MD5
537969dbe0feb608879cc514855382ca
-
SHA1
6c078214d18be2ade8effb771ad2e164c090075a
-
SHA256
9ac3382b89c40d58a4c8c9d5426b276f9a446944c0ca500fed3126f470c265e7
-
SHA512
f19f42ea0b5b48423eab5a097b0761852e4427880c78e070fff620da4332c63aa445274feff05603d7fe7cc4f69a7649bddc23381938b525e3c3a17084c81620
-
SSDEEP
3072:1Ka2zAvD7U9yKdxvEb6/APoCGGTQGJA1T3wv:5KtAPoCGGTQGJA1T3wv
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9ac3382b89c40d58a4c8c9d5426b276f9a446944c0ca500fed3126f470c265e7.doc.doc .vbs windows office2003
ThisDocument