Behavioral task
behavioral1
Sample
fee3a9f3a857b758eda5a43c5b4dbcec71e2f466ab96588749a5e114dfeca019.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fee3a9f3a857b758eda5a43c5b4dbcec71e2f466ab96588749a5e114dfeca019.doc
Resource
win10v2004-20240226-en
General
-
Target
fee3a9f3a857b758eda5a43c5b4dbcec71e2f466ab96588749a5e114dfeca019
-
Size
559KB
-
MD5
afe1f398aae29df271eaffbe63d6c2d3
-
SHA1
e5366d28aa1f9ab25e94aee087b4661b51a1bc4f
-
SHA256
fee3a9f3a857b758eda5a43c5b4dbcec71e2f466ab96588749a5e114dfeca019
-
SHA512
65041436c584001e52b1ecc0e0ecc8917f1c555f0d89ca8da6ccaf3501145133600b87d5c767eb36285dbf38436b4e61da56c92e95930a1bca3f69385f197b00
-
SSDEEP
6144:2Bb4PU5X4K8MFicynrKzlQulnYgPCAL/hF3cwdOI1FU1KfPK82xfkgsFN:2iPoX4to2rKzplYcPFrdIiy881sFN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
fee3a9f3a857b758eda5a43c5b4dbcec71e2f466ab96588749a5e114dfeca019.doc windows office2003