Behavioral task
behavioral1
Sample
9492ca1fddcb0a7be122abca637922d0f6661e2172a5dddbd7eb0f04f9abd3e9.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9492ca1fddcb0a7be122abca637922d0f6661e2172a5dddbd7eb0f04f9abd3e9.doc
Resource
win10v2004-20231215-en
General
-
Target
9492ca1fddcb0a7be122abca637922d0f6661e2172a5dddbd7eb0f04f9abd3e9
-
Size
59KB
-
MD5
17a95cca43fee410730ed2991789f33d
-
SHA1
8b3fb0f872dfa04aa442ef16626ca3a7ae201dcc
-
SHA256
9492ca1fddcb0a7be122abca637922d0f6661e2172a5dddbd7eb0f04f9abd3e9
-
SHA512
6ee1f08b954558515cbec7087eaa739151d130ce80f5f547c443a4ecd07e989e230437f55bf9527a085011e84db1bd325392923742903de2a5e980f9ee542cc0
-
SSDEEP
1536:N36h5s3CJQXZBEbarve8AXpCH9um5FaB:x6h5/QJBEbarve8409uQFaB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9492ca1fddcb0a7be122abca637922d0f6661e2172a5dddbd7eb0f04f9abd3e9.doc windows office2003