Behavioral task
behavioral1
Sample
bc71463b09a11ed39f6286fba1b31ed0a34cc48bb9058faba9744de2e992de93.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc71463b09a11ed39f6286fba1b31ed0a34cc48bb9058faba9744de2e992de93.doc
Resource
win10v2004-20240226-en
General
-
Target
bc71463b09a11ed39f6286fba1b31ed0a34cc48bb9058faba9744de2e992de93
-
Size
1.2MB
-
MD5
74217074502db280e75b3c29040b0c64
-
SHA1
dbbd0644c7fd19d94517fca57259b76236dba3f8
-
SHA256
bc71463b09a11ed39f6286fba1b31ed0a34cc48bb9058faba9744de2e992de93
-
SHA512
30737a8bafede4d491a08167a2b6f2644104e78d16a75f4133075e49ccdf310fee1fa75c0cbc5190ac61e62d5fb5efc4eb6f7d024334ff8ecae9c5fe84fe2914
-
SSDEEP
24576:aAQJcgBqeZGoYTHdJ/HLGydLv12SL/LUYLwZ4LXQLWi1YlB1h9Fv1KVU1h9UHXwI:ahcWqeZGoYLd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
bc71463b09a11ed39f6286fba1b31ed0a34cc48bb9058faba9744de2e992de93.doc windows office2003