Behavioral task
behavioral1
Sample
892b13709077dd49de6b7c9c1c6a44e8fcfff58a8e66e2ba6582e9ac110554ef.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
892b13709077dd49de6b7c9c1c6a44e8fcfff58a8e66e2ba6582e9ac110554ef.doc
Resource
win10v2004-20240226-en
General
-
Target
892b13709077dd49de6b7c9c1c6a44e8fcfff58a8e66e2ba6582e9ac110554ef
-
Size
2.1MB
-
MD5
6cb177f15102dd9bb69b8ef0d04c5832
-
SHA1
56ec495319c36beefc7f378e3bd0825af0c91697
-
SHA256
892b13709077dd49de6b7c9c1c6a44e8fcfff58a8e66e2ba6582e9ac110554ef
-
SHA512
31d9a9779e99749198cbcb5b57c83b0f5bd6bd7afabbb39cb883cad4491565b9c7ff0337cf7e7e1b614351024c627711be0ad7d38734c86c8c43e86cd60c8831
-
SSDEEP
24576:bzPwGc8Yk9ZVH3h3+z91bCenH7KmjJnXLeda4Tz6eYtVjC:fY29ZVx3+3LGmjJEYt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
892b13709077dd49de6b7c9c1c6a44e8fcfff58a8e66e2ba6582e9ac110554ef.doc windows office2003