Behavioral task
behavioral1
Sample
8979643f78d1d373e2c285c0da6808da6607cc9d247155ee4b7d1acdb1361992.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8979643f78d1d373e2c285c0da6808da6607cc9d247155ee4b7d1acdb1361992.doc
Resource
win10v2004-20240226-en
General
-
Target
8979643f78d1d373e2c285c0da6808da6607cc9d247155ee4b7d1acdb1361992
-
Size
578KB
-
MD5
d43a109c177afbdcaf277088e2b9f264
-
SHA1
991005894220b8eb448ce5d7c60424115ff5544b
-
SHA256
8979643f78d1d373e2c285c0da6808da6607cc9d247155ee4b7d1acdb1361992
-
SHA512
06a919c04a394293e82aa3643c63bf38fec62b95164fc7478d9a1ef7474922d1ea20e823119b2d761ee54212eb306a15c92917573fcc5bbf11eb7439cc840349
-
SSDEEP
6144:gQbwHysgUwMF8cynrKzlAulnYgPKL/hn3cwdOI1FU1WfPK82xfktszrF:gVHwoIrKzhlYcKF9dImy88wszrF
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
8979643f78d1d373e2c285c0da6808da6607cc9d247155ee4b7d1acdb1361992.doc windows office2003