Behavioral task
behavioral1
Sample
f83629246203cd12705360af19009bc31ed2e623bade6bc9c86293a3bdcae94d.doc
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
f83629246203cd12705360af19009bc31ed2e623bade6bc9c86293a3bdcae94d.doc
Resource
win10v2004-20230703-en
General
-
Target
f83629246203cd12705360af19009bc31ed2e623bade6bc9c86293a3bdcae94d
-
Size
476KB
-
MD5
9df8839d6bc2c7c35d5b9005b3af6ab5
-
SHA1
ca5afd61e59976b94aadbe893e6b8dd77af21076
-
SHA256
f83629246203cd12705360af19009bc31ed2e623bade6bc9c86293a3bdcae94d
-
SHA512
2ced0784b0d8bde6b82cdc22e63243fcede047851ea6021b12d8bb143551fc08d6f9ee491a20b5a7b598981b96bd2bb0f34352dbfec28f09cac939278ae46f73
-
SSDEEP
6144:My1vrfWBAA2PGFbc3Bgho/n44cJFxb51vrfWBAD12PGFbc3BghU/n443:My1DfWBtOgoA4cJFxF1DfWBsOgUA4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
f83629246203cd12705360af19009bc31ed2e623bade6bc9c86293a3bdcae94d.doc windows office2003