Behavioral task
behavioral1
Sample
774ea05c356f0adc613187f538f4f69cd8d560cb5b7320e7e0b8b80e12938c95.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
774ea05c356f0adc613187f538f4f69cd8d560cb5b7320e7e0b8b80e12938c95.doc
Resource
win10v2004-20240226-en
General
-
Target
774ea05c356f0adc613187f538f4f69cd8d560cb5b7320e7e0b8b80e12938c95
-
Size
282KB
-
MD5
2138b92e7e18578f4ef7dc1d3453115b
-
SHA1
dd565b7fb5dc5ce1d1b1292983abb9e0a81550bb
-
SHA256
774ea05c356f0adc613187f538f4f69cd8d560cb5b7320e7e0b8b80e12938c95
-
SHA512
0ecbcdba4d6681722161cda7ba5b52bbf000db3aa437ff90255d668c314f874d9edf654dcdfe31db626aed8895838206c7e897ccd03f2ac99cb13b4989294e03
-
SSDEEP
3072:n27MxSNDeT/8PzUSLPXiMOfcNiTuLEdfB3gjyGwbjLT7Dr+OI4Rbi0cjLT7Drro3:n2oiifpwibT+6g9omAW9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
774ea05c356f0adc613187f538f4f69cd8d560cb5b7320e7e0b8b80e12938c95.doc windows office2003