Behavioral task
behavioral1
Sample
24d47c2854c912bf4f539274739bab6e253c4907b3aeb307488d2034fc47f8b7.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24d47c2854c912bf4f539274739bab6e253c4907b3aeb307488d2034fc47f8b7.doc
Resource
win10v2004-20220812-en
General
-
Target
24d47c2854c912bf4f539274739bab6e253c4907b3aeb307488d2034fc47f8b7
-
Size
91KB
-
MD5
83f90de37c53381c1bc0224efbe968e0
-
SHA1
68db09968efce54b2aa21f0617b6b9cb78ccfa6e
-
SHA256
24d47c2854c912bf4f539274739bab6e253c4907b3aeb307488d2034fc47f8b7
-
SHA512
7433271f721cee56e8e250987c68d0a213ee343d75fd2e3f2d9b5950f6efcfa23b9191a7db32ccc52358774119204d32fcd7c61d69f39deff355e9db34ef13cf
-
SSDEEP
1536:VLUDi68EG3vAnjpIjS23+qvlnTI2pSTq3:dUu68xkjpESNclnTTpSTq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
24d47c2854c912bf4f539274739bab6e253c4907b3aeb307488d2034fc47f8b7.doc windows office2003
ThisDocument
Module1
Module2
Module3