Behavioral task
behavioral1
Sample
47f7765d3ef41dfcdb0b936f3e554d3b6726eeabff7c665acd034824fc7e87a7.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47f7765d3ef41dfcdb0b936f3e554d3b6726eeabff7c665acd034824fc7e87a7.doc
Resource
win10v2004-20240226-en
General
-
Target
47f7765d3ef41dfcdb0b936f3e554d3b6726eeabff7c665acd034824fc7e87a7
-
Size
1.4MB
-
MD5
a6d8cc18af5a983b4c1a7f4838780b01
-
SHA1
4f7c05ae7e072ba452c4c1992c5255a5b8b15f52
-
SHA256
47f7765d3ef41dfcdb0b936f3e554d3b6726eeabff7c665acd034824fc7e87a7
-
SHA512
211c6fead39c1d19a4f517d02a1a857a606d53fed9eb9d5b13a84ec88f795b8c5ee4ff47ac68b27dde24dcc11b1f7b64869cee4427db25cd44e1d705248f967f
-
SSDEEP
6144:pWBfBfm+aPE4Fp9ywqjRr+13MZfTUoe3nZ/7VV7s5BjaL4wogYpIHDsAuhvgVcBw:cPmV1YCxWmpgBjmzVcGrZzfBV0+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
47f7765d3ef41dfcdb0b936f3e554d3b6726eeabff7c665acd034824fc7e87a7.doc windows office2003
ThisDocument