Behavioral task
behavioral1
Sample
f5208159e44475e5cb1f079673de213934be7ff180b91a04a4f57965211b6710.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5208159e44475e5cb1f079673de213934be7ff180b91a04a4f57965211b6710.doc
Resource
win10v2004-20240226-en
General
-
Target
f5208159e44475e5cb1f079673de213934be7ff180b91a04a4f57965211b6710
-
Size
212KB
-
MD5
1144d4a771054e79744779e67cbd35d3
-
SHA1
afb12d2b2d75049b68387eab511e0d9facecbfd6
-
SHA256
f5208159e44475e5cb1f079673de213934be7ff180b91a04a4f57965211b6710
-
SHA512
81602403585dc9922c42825ace3ffb4661dd2749abf1003d2b72a956937e94d5ddfd47cbfaffe4a588c0226f77ae0f8966f43c987273e0ef086509233e1646e0
-
SSDEEP
6144:kSCjs86md8R67juzwtA3X/ZCGNrKGsLrn1qSaHYrH/:ZCjsl68R6HuzwtUhCGNrKGsLrn1qSaHU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f5208159e44475e5cb1f079673de213934be7ff180b91a04a4f57965211b6710.doc windows office2003
ThisDocument
ModuleDiverse
ModuleRegistry
ModuleScramble
ModuleGlobale
UserFormWaitForMaxima
mUnviewable
ModuleAutoMacros
CMG
DPB
GC
ModuleWordMatWrap
VBAextensions
MaximaWSH
PublicModulesForWordMat
ModuleWindowsFunctions
MaximaDirectdll
oAppClass