Behavioral task
behavioral1
Sample
84d523833db6cc74a079b12312da775d4281bf1034b2af0203c9d14c098e6f29.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
84d523833db6cc74a079b12312da775d4281bf1034b2af0203c9d14c098e6f29.doc
Resource
win10v2004-20240226-en
General
-
Target
84d523833db6cc74a079b12312da775d4281bf1034b2af0203c9d14c098e6f29
-
Size
51KB
-
MD5
5c0db4b48129acc977e26de7daed6b49
-
SHA1
2021c163c7fcae8f4941ea50247ae3fa3eb1dde9
-
SHA256
84d523833db6cc74a079b12312da775d4281bf1034b2af0203c9d14c098e6f29
-
SHA512
a543e2a02a913c0e725a10dcb72c5ed33365dc02f8949660c5832764b0364600cfcf54caf41888e52461670fdaa53b005d876c9fc0b5875ed6ff4591b28be5f9
-
SSDEEP
768:N8u3yKsUyN8ekRFmKzPGr4Z0tXfgdsGgV6:N8yykyN8eymKzxZ0tI+GgV6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
84d523833db6cc74a079b12312da775d4281bf1034b2af0203c9d14c098e6f29.doc windows office2003
ThisDocument
NewMacros