Behavioral task
behavioral1
Sample
f77e434d4264fb473fb7d585d117f7e51d498f66949976c9887a2d8c87942fbd.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
f77e434d4264fb473fb7d585d117f7e51d498f66949976c9887a2d8c87942fbd.doc
Resource
win10v2004-20240508-en
General
-
Target
922953df4f3b10c7debc94b6e41a790b.bin
-
Size
564KB
-
MD5
9cbf93867b8e4c7e17605aaa8558e147
-
SHA1
8e369f1d7124b35b5a5a6852f981f5bb7fce5d84
-
SHA256
4ae24f4fd1dcbf2cbda6539d9bc13b57219c603ea6bc09e19482094eba614eb6
-
SHA512
631c0a4a23cb406731a01d1b4d37d57e43a193f5785306f1675f3112fe132215e384a9dc633a7fbc324b1ac441dabed5050515417580415fcc4fff0e971ec090
-
SSDEEP
12288:MzYLisc6sqLD5LwVPFc8DHWlEk+1LqX8ctpEL5CWDqAzjKunksCFOms:MzYLisc6sqf6VP287k+1LMdcLcXAzWuh
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/f77e434d4264fb473fb7d585d117f7e51d498f66949976c9887a2d8c87942fbd.doc office_macro_on_action -
resource static1/unpack001/f77e434d4264fb473fb7d585d117f7e51d498f66949976c9887a2d8c87942fbd.doc
Files
-
922953df4f3b10c7debc94b6e41a790b.bin.zip
Password: infected
-
f77e434d4264fb473fb7d585d117f7e51d498f66949976c9887a2d8c87942fbd.doc.doc windows office2003
ThisDocument