Behavioral task
behavioral1
Sample
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730.doc
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730.doc
Resource
win10v2004-20231023-en
General
-
Target
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730
-
Size
46KB
-
MD5
22ec6c0a1b5690a63c28f20b552ba7c6
-
SHA1
c5554c56d4d45978c192b292f08b28171f949393
-
SHA256
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730
-
SHA512
2a52de8efef7eeade654c22fab186ed410ae9f7782c0fe94f268eff5851a897bb3bce8a8c376a8d020ef2837fbaed10c98c32b4d3ba9bb25fbb184cd71f6e6ee
-
SSDEEP
384:FAu0FtlGJiS8px8SMDYCX/chqTKnhtVgUNai92ufcM7QeWN0jl:Cu0Lp3yRTUNaiYNMW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
832e5d6734d28e0576fcded20412cfe0335bcc0dad067fe1a9ae345891848730.doc windows office2003
ThisDocument
NewMacros