Behavioral task
behavioral1
Sample
96ad28177c4ffea0daae4c12f7b755e4477e46512effcbaf35c65a2919667a8f.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96ad28177c4ffea0daae4c12f7b755e4477e46512effcbaf35c65a2919667a8f.doc
Resource
win10v2004-20240226-en
General
-
Target
96ad28177c4ffea0daae4c12f7b755e4477e46512effcbaf35c65a2919667a8f
-
Size
228KB
-
MD5
423cff633679c5dc1bfb27b4499eb171
-
SHA1
9f3d2e66f8e9b932bf7753300354c46271203b9c
-
SHA256
96ad28177c4ffea0daae4c12f7b755e4477e46512effcbaf35c65a2919667a8f
-
SHA512
173a0abaff740cd7142f142c936deb8d89b28f36414c528ca192fe95fe0f810559e9dbd5ca0579616dc6d1bae37c3c1958e0cbd6cca7b97c2fa4a91de840a96f
-
SSDEEP
3072:e3FQyTBPvSIK0S4iiIo0sRN4yJx/MGz3AfEdNSh9JwvXL94yeXlpm:e3FQ8BPvOzwBRNJ/HTAfEdNeC7Sye1
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
96ad28177c4ffea0daae4c12f7b755e4477e46512effcbaf35c65a2919667a8f.doc windows office2003