Behavioral task
behavioral1
Sample
96f815abb422bb75117e867384306a3f1b3625e48b81c44ebf032953deb2b3ff.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96f815abb422bb75117e867384306a3f1b3625e48b81c44ebf032953deb2b3ff.doc
Resource
win10v2004-20240226-en
General
-
Target
96f815abb422bb75117e867384306a3f1b3625e48b81c44ebf032953deb2b3ff
-
Size
52KB
-
MD5
900e892c8151f0f59a93af1206583ce6
-
SHA1
aea15a7ce95761a556199f5a774be293a82c17c2
-
SHA256
96f815abb422bb75117e867384306a3f1b3625e48b81c44ebf032953deb2b3ff
-
SHA512
dcd7f9842e4b3a91cfd994da7d93a8dc1695c4cbbd2aa18b4ce363dd023c43875982fe84b288039ddd8ec21f63f6af90834e05980ac19e73133c1a43aa0467b7
-
SSDEEP
384:hmppTpTwAJ9F7bleq222GTE5iSwvxjk+twXeTgp0O9TS6g0jntV+:aFetMxw+t82O9T8j
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
96f815abb422bb75117e867384306a3f1b3625e48b81c44ebf032953deb2b3ff.doc windows office2003
ThisDocument
Module1