Behavioral task
behavioral1
Sample
e7a491933c4aad758e1be9ec7e3110b986356875d9fe5365d02192f9284170d4.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e7a491933c4aad758e1be9ec7e3110b986356875d9fe5365d02192f9284170d4.doc
Resource
win10v2004-20240226-en
General
-
Target
e7a491933c4aad758e1be9ec7e3110b986356875d9fe5365d02192f9284170d4
-
Size
58KB
-
MD5
60cf71554049ffce4d25140080803545
-
SHA1
f5c769d2a27877e56cc0c540490b26c7c0ff25dd
-
SHA256
e7a491933c4aad758e1be9ec7e3110b986356875d9fe5365d02192f9284170d4
-
SHA512
ffb7ba99a652efab5298a31d6fda92cbfb2faabed20938d524b367075cc18f6b1b7ab47d7258cce1c82780f55ac4bf63a7313af48c4edeed335bbf855e0aeae3
-
SSDEEP
768:rvkKKsp+9iF7gWMsdMVkj1cdqJ1tMAlDGxz99oinZ:DAsp+9iF7gWMsdlj1cdqHfDG3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e7a491933c4aad758e1be9ec7e3110b986356875d9fe5365d02192f9284170d4.doc windows office2003
ThisDocument