Behavioral task
behavioral1
Sample
a4b817eaea896f858843cbb65f55dabe2bf46ba16d795af7db5f0627f8afd492.doc
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
a4b817eaea896f858843cbb65f55dabe2bf46ba16d795af7db5f0627f8afd492.doc
Resource
win10v2004-20230621-en
General
-
Target
a4b817eaea896f858843cbb65f55dabe2bf46ba16d795af7db5f0627f8afd492.doc
-
Size
22KB
-
MD5
7d66eaa8060b0b5aa6f22f510d9317a0
-
SHA1
4a67d2e3f1184451a95c262464b34c22177a026e
-
SHA256
a4b817eaea896f858843cbb65f55dabe2bf46ba16d795af7db5f0627f8afd492
-
SHA512
3cfd2a1f2d5b5d143c7d3ba6e1271c39288a93f5e6c4b6eb02626b1bcb0f25ab1558391643cf8ce5248a75122cb4bd9e1dba80b70856932d682d36290e155e51
-
SSDEEP
384:Khd6uIZG6zV3LktnVc0rf25H20jEktRJ2qL3pzppAXM8pR:ch0G6zcVc0p3bq3pzpeZR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a4b817eaea896f858843cbb65f55dabe2bf46ba16d795af7db5f0627f8afd492.doc.doc .vbs windows office2003