Behavioral task
behavioral1
Sample
9470ea50f0cba10ffb038833c0ed48bd046d4de9cb864245edd894b942f140c1.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9470ea50f0cba10ffb038833c0ed48bd046d4de9cb864245edd894b942f140c1.doc
Resource
win10v2004-20230915-en
General
-
Target
9470ea50f0cba10ffb038833c0ed48bd046d4de9cb864245edd894b942f140c1
-
Size
15KB
-
MD5
eecb8f8d480ffec2618741d115be023b
-
SHA1
362d94deebe0d835d35f867618a2acba4aae4525
-
SHA256
9470ea50f0cba10ffb038833c0ed48bd046d4de9cb864245edd894b942f140c1
-
SHA512
3b14542261dc37e20428f6335f28b85178f1b57bb8dd158bb9e748514663e4489e21fe2803523afb2dd1d19ff9ba0cc32ded96c42272ca6e3c05344e7e8b7879
-
SSDEEP
192:mzI9YN/HJekMjOOq3va/+uQgNOr8JDt3y36vsDyH+jTQi2bOq:m09s/HM0OiTuMr8JDVc6vuHQBSq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9470ea50f0cba10ffb038833c0ed48bd046d4de9cb864245edd894b942f140c1.doc windows office2003