Behavioral task
behavioral1
Sample
724a0dcede84e6527d16318cc9c425ae8743be4d5c6b5f62aea0ba67ec6b5ac3.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
724a0dcede84e6527d16318cc9c425ae8743be4d5c6b5f62aea0ba67ec6b5ac3.doc
Resource
win10v2004-20230220-en
General
-
Target
724a0dcede84e6527d16318cc9c425ae8743be4d5c6b5f62aea0ba67ec6b5ac3.doc
-
Size
94KB
-
MD5
107f50fb25cd1860585126b0ceb399b7
-
SHA1
7b754a862af0a6154f576c5c100b3c07c721eae6
-
SHA256
724a0dcede84e6527d16318cc9c425ae8743be4d5c6b5f62aea0ba67ec6b5ac3
-
SHA512
c0caaf595fb4e998469b2e98134d495fd5da8d4254d6a3ba45991a68a919656a408ce0cf898b81a4ce4dc7a95e528fdd1abc6d2b5a4f85e98131d069e2796a5c
-
SSDEEP
1536:hb15xsRxzwxCVPGu1ntoFRSbOTP23hdNnm:oH9V/2sa23hdZm
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
724a0dcede84e6527d16318cc9c425ae8743be4d5c6b5f62aea0ba67ec6b5ac3.doc.doc windows office2003
ThisDocument