Behavioral task
behavioral1
Sample
9f968783541dafc5da3a3933e8b95fa1097480b6dca6952dbcb0517710cf8893.doc
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
9f968783541dafc5da3a3933e8b95fa1097480b6dca6952dbcb0517710cf8893.doc
Resource
win10v2004-20231025-en
General
-
Target
9f968783541dafc5da3a3933e8b95fa1097480b6dca6952dbcb0517710cf8893.doc
-
Size
35KB
-
MD5
3d21811aaa70aa7ca0176bd85c1743c6
-
SHA1
d2b768651f86f59a78abf993b299e797853b9335
-
SHA256
9f968783541dafc5da3a3933e8b95fa1097480b6dca6952dbcb0517710cf8893
-
SHA512
c27c4d8a8fe6412062bc76beeaffc4777e05a0d6d80a96697506e1e96333840459a898c1042a11cb8b8cf7e14c55dd09befbb0d0a3ccdfde6f05ee52324ac21f
-
SSDEEP
384:eHfPjiS/ILJHRppiiljbE0ji3/lvI+fRIhCO+oONu62/2t7BZ+TE:Wf+RpTmX3/lvIORIhCyONu62/BTE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9f968783541dafc5da3a3933e8b95fa1097480b6dca6952dbcb0517710cf8893.doc.doc windows office2003