Behavioral task
behavioral1
Sample
5205d4d9e98c1b6b544b7decdd61777232b4573b1742fee90c25123b47752161.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5205d4d9e98c1b6b544b7decdd61777232b4573b1742fee90c25123b47752161.doc
Resource
win10v2004-20240226-en
General
-
Target
5205d4d9e98c1b6b544b7decdd61777232b4573b1742fee90c25123b47752161.doc
-
Size
138KB
-
MD5
ec5ef79f5cbf5107088736eb37ef91d6
-
SHA1
33ec215ec304c6c0febb1251f75eb3c4668cf31c
-
SHA256
5205d4d9e98c1b6b544b7decdd61777232b4573b1742fee90c25123b47752161
-
SHA512
4165e755382ec8b906b0cd67ca6324f3db7456e20ad2963ba80967630a89c8146b7721432f5b904ac75b5635751f25e6b506c73d5a4db61ecc498260a179b650
-
SSDEEP
1536:+wAplh100VCtmbCbQJZLEOCn1zATC+gvPYDkiUyqwpviyIJjjZaAeg8T5QKbkEcP:chuGzZLEO02C1vggjwFVEjjOA51Kd0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5205d4d9e98c1b6b544b7decdd61777232b4573b1742fee90c25123b47752161.doc.doc windows office2003
ThisDocument
NewMacros