Behavioral task
behavioral1
Sample
da3d1f29eb09678ecb364b9488a7f0b0f351e5e0348b6f0f18beb06e9b43b1df.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
da3d1f29eb09678ecb364b9488a7f0b0f351e5e0348b6f0f18beb06e9b43b1df.doc
Resource
win10v2004-20231215-en
General
-
Target
da3d1f29eb09678ecb364b9488a7f0b0f351e5e0348b6f0f18beb06e9b43b1df
-
Size
178KB
-
MD5
c02fea152e9dad2b8eee662c095a2894
-
SHA1
13068d23d2a8298bffdc3f8d6ec25617665669a9
-
SHA256
da3d1f29eb09678ecb364b9488a7f0b0f351e5e0348b6f0f18beb06e9b43b1df
-
SHA512
800123f57847bf3abba031fa23bf2bf1d07fa42cb07bda6c72301538900d8abd771c94c75af8fd1b3fc6011e597499e6857df84c48bbeffc98fd2695085bc13d
-
SSDEEP
3072:ksbC7M7iebsj5Mvs7Ru0TnR+R6Nd+3pqD84Xg4ZEzL:xCoZwSQRulAd+W84XgJ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
da3d1f29eb09678ecb364b9488a7f0b0f351e5e0348b6f0f18beb06e9b43b1df.doc windows office2003