Behavioral task
behavioral1
Sample
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec.docx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec.docx
Resource
win10-20240404-en
General
-
Target
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec.zip
-
Size
925KB
-
MD5
9a13ed93cbc3daed36fa2451cabe14e6
-
SHA1
ca0210be4439082e2dda9393dde687b55ba6da3f
-
SHA256
464d5243cb4340e391b62802753cc81f283e06bfea892808658eba5e90aa35b0
-
SHA512
7c33f300d9f35a4590eac6fc6d811461712ded31e423e8d2ac87e7a04af68815af275ec103b638847a683333664b6ff6b64a2edc20312453d1c7d984d0024af9
-
SSDEEP
24576:1kxnh7Dug+Qf68r7L5NE2KaCfnEavNHjnSP:K9IcC8/922pMnEaFDk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec.docx office_macro_on_action -
resource static1/unpack001/0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec.docx
Files
-
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec.zip.zip
Password: infected
-
0b22278ddb598d63f07eb983bcf307e0852cd3005c5bc15d4a4f26455562c8ec.docx.doc .docx windows office2003
ThisDocument