Behavioral task
behavioral1
Sample
b96701183e66df193572097069f278580d6cf56a7748071c3881b49fec202f6d.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b96701183e66df193572097069f278580d6cf56a7748071c3881b49fec202f6d.doc
Resource
win10v2004-20240226-en
General
-
Target
b96701183e66df193572097069f278580d6cf56a7748071c3881b49fec202f6d
-
Size
8KB
-
MD5
2edc2f12704c00a3ba6a945b71fee1e2
-
SHA1
f26b02343c07ef4147ab8f204576ef6e7e4997c8
-
SHA256
b96701183e66df193572097069f278580d6cf56a7748071c3881b49fec202f6d
-
SHA512
8b9307e41dd4898ece710ef399f6f2463bdf1ab5b679d1b1dda0b4f0f3234b37bd74081067c365e6a46f3449ad2ab4b4edc666a2a3a72f0bf78e2bdc1f247701
-
SSDEEP
96:E1LPrmi81fUWnLhRJ/l1vp+X4S1wB2B6utG5uIiCsDYMGaaUjix7:E1zS1VWDM1utUBqVaR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b96701183e66df193572097069f278580d6cf56a7748071c3881b49fec202f6d.doc windows office2003
ThisDocument
NewMacros