Behavioral task
behavioral1
Sample
b1e5781f8cb500f306211a954bfe4a7bb19eeb8fa95b71f64052611bdfde30b1.doc
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
b1e5781f8cb500f306211a954bfe4a7bb19eeb8fa95b71f64052611bdfde30b1.doc
Resource
win10v2004-20230621-en
General
-
Target
b1e5781f8cb500f306211a954bfe4a7bb19eeb8fa95b71f64052611bdfde30b1
-
Size
121KB
-
MD5
1f5e6d502290f9ece3f0e7047facc7b6
-
SHA1
a066d2e31ee4c37c6936f16543e8b5cf9cba1ddd
-
SHA256
b1e5781f8cb500f306211a954bfe4a7bb19eeb8fa95b71f64052611bdfde30b1
-
SHA512
44ccc2b7d2c5f4b4c9a3f98815ae350cc970ccff2b4e9650410f6ff03b540866a744ceb8b3d916601a563cadbcf34e77461ed2740d7a26246703c6f3fe836fdf
-
SSDEEP
1536:hlhWHrfLYhDx590r1E27OWrMiCcoXUWz6GA4v:TWrfLYpx59w7OWg4oD/A
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b1e5781f8cb500f306211a954bfe4a7bb19eeb8fa95b71f64052611bdfde30b1.doc windows office2003
ThisDocument