Behavioral task
behavioral1
Sample
b28028b1fefb5c3da40e3bc00c4027977095588f7050b8d1103dfbe54b842f57.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b28028b1fefb5c3da40e3bc00c4027977095588f7050b8d1103dfbe54b842f57.doc
Resource
win10v2004-20240226-en
General
-
Target
b28028b1fefb5c3da40e3bc00c4027977095588f7050b8d1103dfbe54b842f57
-
Size
58KB
-
MD5
58a641fb49f62ad8d57a0e3fb16829c1
-
SHA1
09650cb7a5ed0f43cf67985d03182ca608591a7c
-
SHA256
b28028b1fefb5c3da40e3bc00c4027977095588f7050b8d1103dfbe54b842f57
-
SHA512
148bfbb264fd9a998e588fd0d77f2a117e25c272fb8e29b9a8a31b8cc061d561a0308201316c68e8c724b5ddd10dc66472edfdc19b3c6fc7626e9f5f93df22d5
-
SSDEEP
768:ijKKM2Y9iF7gWMsdMVkO1cdqmcXtnDHxz99oinZ:iBMX9iF7gWMsdlO1cdq39nDH3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b28028b1fefb5c3da40e3bc00c4027977095588f7050b8d1103dfbe54b842f57.doc windows office2003
ThisDocument