Behavioral task
behavioral1
Sample
17c214b6481e81a24925d164efea926568ab77b769a405c64ffbe9b5ce18f8fa.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
17c214b6481e81a24925d164efea926568ab77b769a405c64ffbe9b5ce18f8fa.doc
Resource
win10v2004-20230915-en
General
-
Target
17c214b6481e81a24925d164efea926568ab77b769a405c64ffbe9b5ce18f8fa
-
Size
28KB
-
MD5
1a72afcce4f3f4b9cd0917043d81fc57
-
SHA1
984e95fc7095057bd8c61695060c1b056afb03c5
-
SHA256
17c214b6481e81a24925d164efea926568ab77b769a405c64ffbe9b5ce18f8fa
-
SHA512
54231b5cb091633d845b4487dd575edc763b0f4b78c3473044d8dacc095630f925d9b253ce0524ac6b3a1dd70e4f5f02167820cac5c475246a62ffc0e5286393
-
SSDEEP
384:KWgVNsCDFH/gGs3DQJHAIjTCR2wQVANhkjtkxrgKyRxEk7aAg8iz8HjyR5dw:eeGs01TK22lrgTEk7aAg2Huw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
17c214b6481e81a24925d164efea926568ab77b769a405c64ffbe9b5ce18f8fa.doc windows office2003
ThisDocument
Module1