Behavioral task
behavioral1
Sample
a367d629817f891d02530308138d783aad6b373860167e8c4c107a81f8fbda91.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a367d629817f891d02530308138d783aad6b373860167e8c4c107a81f8fbda91.doc
Resource
win10v2004-20240226-en
General
-
Target
a367d629817f891d02530308138d783aad6b373860167e8c4c107a81f8fbda91
-
Size
360KB
-
MD5
2a573ed22000835cd130096febb8521e
-
SHA1
e03a5c56d83bc7f3489b54fa3da986410cb6a8cb
-
SHA256
a367d629817f891d02530308138d783aad6b373860167e8c4c107a81f8fbda91
-
SHA512
27955413db406ff79d1aa7ac9379a85ab6cd3d5c39c9a7c8040aace7f175f2f8ef2d0d86d85fd06ee691a7b105205ac60861240c51634c341e47e77d4c224085
-
SSDEEP
6144:HbHh5DeWHIXFDhxURm80D5TvW7Dmul6F/b+kAo:7Hh5DeWHIXFDhxURCdW7quAF/Dx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a367d629817f891d02530308138d783aad6b373860167e8c4c107a81f8fbda91.doc windows office2003
Form1_workbook
Sheet13
Sheet2
Initialization
Sheet11
Sheet1
Sheet5
UniqueFunction
CommonFunction