Behavioral task
behavioral1
Sample
2fc71184be22ed1b504b75d7bde6e46caac0bf63a913e7a74c3b65157f9bf1df.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2fc71184be22ed1b504b75d7bde6e46caac0bf63a913e7a74c3b65157f9bf1df.doc
Resource
win10v2004-20240319-en
General
-
Target
2fc71184be22ed1b504b75d7bde6e46caac0bf63a913e7a74c3b65157f9bf1df
-
Size
247KB
-
MD5
37505b6ff02a679e70885ccd60c13f3b
-
SHA1
6402fafa0864460fea18a83ec4885bfe179734b2
-
SHA256
2fc71184be22ed1b504b75d7bde6e46caac0bf63a913e7a74c3b65157f9bf1df
-
SHA512
0df4d77d2bc29850318ffe0b25bfe5ef2ddb18272305efba7c8bd190f560164f1994db897938c4d21de2d1e95e15e34ce47e9f278d4a489c3e44508678e64f9f
-
SSDEEP
3072:pOnKnAV+yiSIvVkXm8R2P2seqSRNA8cReE5J0ta7WRrEzU6KldODA4TXZG:pOnKnY+yi3VB/mNAxeE5ita0hdeA49
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
2fc71184be22ed1b504b75d7bde6e46caac0bf63a913e7a74c3b65157f9bf1df.doc windows office2003
ThisDocument
NewMacros