Behavioral task
behavioral1
Sample
a4fd0f515a0abfddac6b3635fb5b067db187843194d78d2ecbf2e3e68884fe0b.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a4fd0f515a0abfddac6b3635fb5b067db187843194d78d2ecbf2e3e68884fe0b.doc
Resource
win10v2004-20231215-en
General
-
Target
a4fd0f515a0abfddac6b3635fb5b067db187843194d78d2ecbf2e3e68884fe0b
-
Size
227KB
-
MD5
df1e75f7df32bfaabd585b6f0e61ac81
-
SHA1
fe5d0a0431146cc920183098e5d975caf9519c8d
-
SHA256
a4fd0f515a0abfddac6b3635fb5b067db187843194d78d2ecbf2e3e68884fe0b
-
SHA512
178ccd72c283fa16c78bfe0b6ff8ef35e026de7efa8037013f10c68d56d14bca412b5d0e1b7f53f13908ca7e056f398c61c778291104bcf1c4879877aca6e779
-
SSDEEP
3072:C25eQF5TS9Kdx5vcwbwCy2rkraTbDLz7jCKyhpRZBJx5xeyqGQ/NMhGuv1dc57oy:y6WwMsuv1dviPa9J
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a4fd0f515a0abfddac6b3635fb5b067db187843194d78d2ecbf2e3e68884fe0b.doc windows office2003