Behavioral task
behavioral1
Sample
944a8fac13b495f11628696c04673115c90ee650fc8ff3e440335e6d73df2496.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
944a8fac13b495f11628696c04673115c90ee650fc8ff3e440335e6d73df2496.doc
Resource
win10v2004-20231215-en
General
-
Target
944a8fac13b495f11628696c04673115c90ee650fc8ff3e440335e6d73df2496
-
Size
1.7MB
-
MD5
020ea21556b56229bb9714e721d893df
-
SHA1
1561bafe1bf4e619a541f07eca8f0a2322f9f686
-
SHA256
944a8fac13b495f11628696c04673115c90ee650fc8ff3e440335e6d73df2496
-
SHA512
b70b0b42c853e3011bdc3d8b193104929849c59ad80a13c619cebe9b115b608c7511ff6dec5e82e3ce3c1998c45d9118a24b103a46869ff923c233ad4dabe99f
-
SSDEEP
12288:OcZSJtDqHu97hYHafKRLxAuP0mtSuMNlnrVrL8t+ctADOMfxdJC0B:pYpqHuRmaKRLxNJuTv8t+cttMpdXB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
944a8fac13b495f11628696c04673115c90ee650fc8ff3e440335e6d73df2496.doc windows office2003
ThisDocument