Behavioral task
behavioral1
Sample
2941f19f7319b92ba58b3247374189fa8f68f9db06b5d81f0ffb8551da07a1bc.doc
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2941f19f7319b92ba58b3247374189fa8f68f9db06b5d81f0ffb8551da07a1bc.doc
Resource
win10v2004-20240226-en
General
-
Target
2941f19f7319b92ba58b3247374189fa8f68f9db06b5d81f0ffb8551da07a1bc
-
Size
638KB
-
MD5
0a768a5c9f4714f7ca92545baf9f72c9
-
SHA1
e36ebdfa682917f174efb4ecff4352d5ea4a5edc
-
SHA256
2941f19f7319b92ba58b3247374189fa8f68f9db06b5d81f0ffb8551da07a1bc
-
SHA512
c33fbd110591ef5d936a423eced3dd139c6cd51d4cc4cbf34b86c4ee340b9db0aa40cd378c93f2c266a74f617eb92516ab1e34a7ee1d604f6c420f893bdfd74e
-
SSDEEP
12288:RHAEMCBBCH/2wZgAEMCBBCH/2ws1TYvV:9RrX+2QgRrX+2R1T
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2941f19f7319b92ba58b3247374189fa8f68f9db06b5d81f0ffb8551da07a1bc.doc windows office2003