Behavioral task
behavioral1
Sample
c2140753abe2aa32e3cc6e584262d9c1b0023924a7931598159e8f8876c93372.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c2140753abe2aa32e3cc6e584262d9c1b0023924a7931598159e8f8876c93372.doc
Resource
win10v2004-20231215-en
General
-
Target
9b48c00eb2ab707158e2d031473e1e00
-
Size
233KB
-
MD5
9b48c00eb2ab707158e2d031473e1e00
-
SHA1
aaef0843d7a039c76ec3c40ee66a5075f6f870f0
-
SHA256
e2be09336ed4a6ee63bad05ff5759201b9235ac300001cb2469d0f3a55a4a30e
-
SHA512
cf49436439f0ab0c2db0d5d5bd2804d09107ce5158e67297cde8c29ad2bec56193e0ad2bc0e9477ee086e979a9e17d0e3451fcdbae36a64789235bf0ef905df6
-
SSDEEP
3072:l/7Ja0CCLFYkK9Ha7wlUs1nTG+zft23f+9YJPtli4LAIk6NlCHW2hCVNDWSs78iM:l/7rCCxJKIqJRsWGFJLCWXN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/c2140753abe2aa32e3cc6e584262d9c1b0023924a7931598159e8f8876c93372 office_macro_on_action -
resource static1/unpack001/c2140753abe2aa32e3cc6e584262d9c1b0023924a7931598159e8f8876c93372
Files
-
9b48c00eb2ab707158e2d031473e1e00.zip
Password: infected
-
c2140753abe2aa32e3cc6e584262d9c1b0023924a7931598159e8f8876c93372.doc windows office2003
ThisDocument
Module1
NewMacros