Behavioral task
behavioral1
Sample
d3b4c09b10fd6381254175020c7389dff32db4883e4c51ba06f3f5340db7c995.doc
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
d3b4c09b10fd6381254175020c7389dff32db4883e4c51ba06f3f5340db7c995.doc
Resource
win10v2004-20240226-en
General
-
Target
d3b4c09b10fd6381254175020c7389dff32db4883e4c51ba06f3f5340db7c995
-
Size
58KB
-
MD5
eab29bd1bd55d389ed1faa0923aa37b1
-
SHA1
8fbc7565af01b4a53c72fede3678f4aeba40c5f4
-
SHA256
d3b4c09b10fd6381254175020c7389dff32db4883e4c51ba06f3f5340db7c995
-
SHA512
aa795990df8e6042a1188af3410aa2d178698bb1135458104e26898718d3409494059a7e4c423e2d4de47e72d5549bedd64a08f39d969d51dc5adb668d1b5ab0
-
SSDEEP
768:/mfxdKiuJ19iF7gWMsdMVkPR1cdqHDQpjDXxz99oinZ:/mfxXuj9iF7gWMsdlJ1cdqUJDX3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d3b4c09b10fd6381254175020c7389dff32db4883e4c51ba06f3f5340db7c995.doc windows office2003
ThisDocument