Behavioral task
behavioral1
Sample
9676877d673fd922a48f129727e9e3d105058b94b7cca08b583bf3d2eb54b046.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9676877d673fd922a48f129727e9e3d105058b94b7cca08b583bf3d2eb54b046.doc
Resource
win10v2004-20240226-en
General
-
Target
9676877d673fd922a48f129727e9e3d105058b94b7cca08b583bf3d2eb54b046
-
Size
3.7MB
-
MD5
6a0e6215d3132ec9995633bd738d0ea2
-
SHA1
bdeada356bf68d8a23158142236ce631be8cd150
-
SHA256
9676877d673fd922a48f129727e9e3d105058b94b7cca08b583bf3d2eb54b046
-
SHA512
eb78acf95320c2d9ca96ef2f376eb8ad909226060c05dc7067f36fe0c6e129a31068dc4eac41a7af6dfe908513448658cd8d536fa06f466a1cd43ce34f70080f
-
SSDEEP
49152:fH0xMdLZRKYQLwWRKfVC7sOtlSxlnDuQkZvrdclpuyDPGp45te:xLqYQLvRKKs/Di3fu3e
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9676877d673fd922a48f129727e9e3d105058b94b7cca08b583bf3d2eb54b046.doc windows office2003