Behavioral task
behavioral1
Sample
b6eac722fe13070e92aec8278351514d05c96fdffd83cd195c5d6f15b124d215.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b6eac722fe13070e92aec8278351514d05c96fdffd83cd195c5d6f15b124d215.doc
Resource
win10v2004-20230915-en
General
-
Target
b6eac722fe13070e92aec8278351514d05c96fdffd83cd195c5d6f15b124d215.doc
-
Size
21KB
-
MD5
1147d947675cd387a43a0596b98c0960
-
SHA1
59bdb469a3f8ac06c89028f8367ac13e89514f87
-
SHA256
b6eac722fe13070e92aec8278351514d05c96fdffd83cd195c5d6f15b124d215
-
SHA512
b5fa36f21217e6ad39a33483950aa7c05f18997bbcb85aa0f9ce38cf7e05fd68e17e9fbbf1e660a1f54e17cb482c262fc98956a06df71c692f2b34b7e27dc03f
-
SSDEEP
192:WsnerZkIuboe9MSaW5nTE7S8vRwIxtQe87IFnuUTN0jS9j9GJW/tlGEbd4qkaV:tEmVMJkMfX/9pTN0jgz/twEb2q
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b6eac722fe13070e92aec8278351514d05c96fdffd83cd195c5d6f15b124d215.doc.doc windows office2003
ThisDocument