Behavioral task
behavioral1
Sample
0196bc9ac3db6f02cfa97323c8fce6cc7318b8f8fadb3e73bdf7971b3c541964.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0196bc9ac3db6f02cfa97323c8fce6cc7318b8f8fadb3e73bdf7971b3c541964.doc
Resource
win10v2004-20231215-en
General
-
Target
0196bc9ac3db6f02cfa97323c8fce6cc7318b8f8fadb3e73bdf7971b3c541964
-
Size
310KB
-
MD5
5308fba9ae4cf2c5e551ab02bae539ba
-
SHA1
125609c8e265b0b22080d289ed9fba74a43175fe
-
SHA256
0196bc9ac3db6f02cfa97323c8fce6cc7318b8f8fadb3e73bdf7971b3c541964
-
SHA512
36b8d047c77c41eb317f3a76dca77a1b1de0c4bd6311987039fe6ff81208140b66154d1b87fede2e67db57f29bf7a651187b65b93bd8edc70ee1cb28f5f0cbac
-
SSDEEP
6144:iQmAobq/RZZN9Z8qlR2XQ2eP/chzwLuCo4gIx32oXa9l80Acz5wK:iQLqq/ZzZ8KcjeXMzQo4H2Ua380Acz5d
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0196bc9ac3db6f02cfa97323c8fce6cc7318b8f8fadb3e73bdf7971b3c541964.doc windows office2003