Behavioral task
behavioral1
Sample
da92b86cd369d39c158bc86c58a252b6f639e1f874651f20f1b8a99324efb999.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
da92b86cd369d39c158bc86c58a252b6f639e1f874651f20f1b8a99324efb999.doc
Resource
win10v2004-20240226-en
General
-
Target
da92b86cd369d39c158bc86c58a252b6f639e1f874651f20f1b8a99324efb999
-
Size
58KB
-
MD5
ad3eae86832c0cc6d7244b24e4cae356
-
SHA1
e53c3b7726cb36b3e898d48ad0f25dbd032e8a8b
-
SHA256
da92b86cd369d39c158bc86c58a252b6f639e1f874651f20f1b8a99324efb999
-
SHA512
203686a118435d1f64181287b2b24201f0964c886f8b67d89604b819056a724034e9bf647e27581b8757e8d879ac788d06d8b1832f59fb2cea09ab232311a111
-
SSDEEP
768:jTKqsp+9iF7gWMsdMVk01cdqO1EtD0xz99oinZ:jxss9iF7gWMsdl01cdq+UD03
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
da92b86cd369d39c158bc86c58a252b6f639e1f874651f20f1b8a99324efb999.doc windows office2003
ThisDocument