Behavioral task
behavioral1
Sample
e40a78e5456b25907fcc009c607b2e816a03f326ecce3480cae9d8230720432f.doc
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e40a78e5456b25907fcc009c607b2e816a03f326ecce3480cae9d8230720432f.doc
Resource
win10v2004-20240226-en
General
-
Target
e40a78e5456b25907fcc009c607b2e816a03f326ecce3480cae9d8230720432f
-
Size
166KB
-
MD5
369b4b9ddcb6b7801fba4923f459e689
-
SHA1
33d74ce0590d71b4d950ea56e5236c4bfce34b8d
-
SHA256
e40a78e5456b25907fcc009c607b2e816a03f326ecce3480cae9d8230720432f
-
SHA512
0b36d6cb548a80ef762eb405a45346a81c94204b3dcfb6aae2e5412faea622cf6fb763b77a324292c947316c86d4c8e82c9bc569d5275cf38429e4e10a383080
-
SSDEEP
3072:I6HtWhxAAH/WnvEpUJyuUoUB01DDDDDDDDDDDDDDDDDADAwJuTDmw9ZXs82Depo:/4lenvEp1uUSo
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e40a78e5456b25907fcc009c607b2e816a03f326ecce3480cae9d8230720432f.doc windows office2003
ThisDocument