Behavioral task
behavioral1
Sample
b490ffc0f5440027b1560165c2e54276b760558c5bb1ab1010d34733c99d1318.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b490ffc0f5440027b1560165c2e54276b760558c5bb1ab1010d34733c99d1318.doc
Resource
win10v2004-20240226-en
General
-
Target
b490ffc0f5440027b1560165c2e54276b760558c5bb1ab1010d34733c99d1318
-
Size
58KB
-
MD5
951e3a0e21166f4421b2710e0d766f3d
-
SHA1
d2d475d2df5b0ec1e97ea45e499f55e45d2aac17
-
SHA256
b490ffc0f5440027b1560165c2e54276b760558c5bb1ab1010d34733c99d1318
-
SHA512
7aadf580d33282ef0c64916d971af6cac05dd2eea0848294263488fc3a35656018d495c2bed91942bfa9f65fdb1a2c8c85f2edd2d1487c4b31eeff76797f9fac
-
SSDEEP
768:8zKCUC9iF7gWMsdMVkz1cdqggXpBDqxz99oinZ:8xUC9iF7gWMsdlz1cdq5rDq3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b490ffc0f5440027b1560165c2e54276b760558c5bb1ab1010d34733c99d1318.doc windows office2003
ThisDocument