Behavioral task
behavioral1
Sample
1a4f8d76f45a465e1a012ad43e8a2e09a49a427f0e0475dfe6a548fca891f0c3.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1a4f8d76f45a465e1a012ad43e8a2e09a49a427f0e0475dfe6a548fca891f0c3.doc
Resource
win10v2004-20240226-en
General
-
Target
1a4f8d76f45a465e1a012ad43e8a2e09a49a427f0e0475dfe6a548fca891f0c3
-
Size
52KB
-
MD5
883b0b054d63682056631f59cb56c64e
-
SHA1
a78079bafa8846e4128ab93a61b5b1dcadc64899
-
SHA256
1a4f8d76f45a465e1a012ad43e8a2e09a49a427f0e0475dfe6a548fca891f0c3
-
SHA512
5f5e7e989bc55a4a228f4bec4ed8b7df5a41b31ca2c0c252ee3792964f028fb99f7e772972302e58e2531964a9e8231ca594f816bae36ffb69f5453864010f9a
-
SSDEEP
768:MqDd47bVYcusI5kozr5/ZLog46Jh1Ax/lFxkwh3pFvGIk:4bVruR5kof5/rf1KtTFM
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1a4f8d76f45a465e1a012ad43e8a2e09a49a427f0e0475dfe6a548fca891f0c3.doc windows office2003
ThisDocument
modTempPathAndFile
Utilities