Behavioral task
behavioral1
Sample
786a1e1b88200fc40de5713689de082edb9a09af908e87a6c2f4b73974a334e0.doc
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
786a1e1b88200fc40de5713689de082edb9a09af908e87a6c2f4b73974a334e0.doc
Resource
win10v2004-20231023-en
General
-
Target
786a1e1b88200fc40de5713689de082edb9a09af908e87a6c2f4b73974a334e0
-
Size
49KB
-
MD5
47c3379412b67d71cfe5f72428c6cb10
-
SHA1
77176556cc88d867dff35922177c3a85326e2616
-
SHA256
786a1e1b88200fc40de5713689de082edb9a09af908e87a6c2f4b73974a334e0
-
SHA512
0848fc59fb9853c9848eafe1275c4817bf9e9d43e512885df948b2cbcefbd27edd01cce831366bbe8e8c09f4c15448258c75ea0c9f1251faa9619b461cc77f05
-
SSDEEP
384:VHAQ9fxbF5VeBeLAKJof/En+YbiSY5Ubt8nrhttb/tGjUaV760jsw6K1Z:nfxb7lGfsTVQCz+fw1Z
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
786a1e1b88200fc40de5713689de082edb9a09af908e87a6c2f4b73974a334e0.doc windows office2003
ThisDocument