Behavioral task
behavioral1
Sample
af93284efb7a0599ff14ceed762bbde4e3a01d53802707d3cb74f15ec3aa1a11.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af93284efb7a0599ff14ceed762bbde4e3a01d53802707d3cb74f15ec3aa1a11.doc
Resource
win10v2004-20240226-en
General
-
Target
af93284efb7a0599ff14ceed762bbde4e3a01d53802707d3cb74f15ec3aa1a11
-
Size
76KB
-
MD5
3abec3a00dadf5a35588f7c7910bd905
-
SHA1
91e0e263f2cc40e78fdc4be2c4db9f795b5d72a4
-
SHA256
af93284efb7a0599ff14ceed762bbde4e3a01d53802707d3cb74f15ec3aa1a11
-
SHA512
eec10084699b42f2e3f687afcb03fd3c77662a9e1dba5c8db880911bac81c9b0e4fe3bb1c2978832487628354fe853fea9cbb7c63d5ba3a88f614a7f096888ea
-
SSDEEP
1536:PC9Q8isZs17o3TeishEtoqAutSsF3H1UrQAIjfj7w20jAKEc:wiSsVo3TVVto3FIcHC
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
af93284efb7a0599ff14ceed762bbde4e3a01d53802707d3cb74f15ec3aa1a11.doc windows office2003