Behavioral task
behavioral1
Sample
9973b5e46a8fde710678ac4821cdad6617b3b78a72e94fe13deb9bf459c0ea4e.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9973b5e46a8fde710678ac4821cdad6617b3b78a72e94fe13deb9bf459c0ea4e.doc
Resource
win10v2004-20240226-en
General
-
Target
9973b5e46a8fde710678ac4821cdad6617b3b78a72e94fe13deb9bf459c0ea4e
-
Size
1.2MB
-
MD5
f4e666bb5fb2eca57d99bffa482b5dbd
-
SHA1
39660ffbe6fdb6dda4ab89729e726882c5737e0d
-
SHA256
9973b5e46a8fde710678ac4821cdad6617b3b78a72e94fe13deb9bf459c0ea4e
-
SHA512
56bb9fd47cb2b84dbf9644b6227e05def5930e41d840dd12eb343420146e0f40347f24b20803fe1984aba9d551928216e4f0d0f3d433362d307445507bb15fb1
-
SSDEEP
24576:TqvLVjWtVCcNM4LpIOL33OCLpAUkL+WwLfZLYG5DhU1g9nA12GU1o9bZUIfUuU++:TqlWTCc
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9973b5e46a8fde710678ac4821cdad6617b3b78a72e94fe13deb9bf459c0ea4e.doc windows office2003