Behavioral task
behavioral1
Sample
4e72fbc5a8c9be5f3ebe56fed9f613cfa5885958c659a2370f0f908703b0fab7.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4e72fbc5a8c9be5f3ebe56fed9f613cfa5885958c659a2370f0f908703b0fab7.doc
Resource
win10v2004-20240226-en
General
-
Target
4e72fbc5a8c9be5f3ebe56fed9f613cfa5885958c659a2370f0f908703b0fab7
-
Size
123KB
-
MD5
714f8341bd1c4bc1fc38a5407c430a1a
-
SHA1
bb1b483d7ee57697fe2c7708e52829ba83806462
-
SHA256
4e72fbc5a8c9be5f3ebe56fed9f613cfa5885958c659a2370f0f908703b0fab7
-
SHA512
67fc6221d1c082280ae8203b193301c0c598e74c5ed3c36a6d5926fb6e0a5e9456818dbeee116ada7dbbeb5449050298a1e626f8dc60c707c554e8e2deaab52b
-
SSDEEP
3072:K72OX0Kx8HTF0RFgY/4lAMwhg0ju9K5jN1WVcHzWXu9X:K7ZX0Kx8HTF0ReY/IAMwhLKkNHzoU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4e72fbc5a8c9be5f3ebe56fed9f613cfa5885958c659a2370f0f908703b0fab7.doc windows office2003
ThisDocument