Behavioral task
behavioral1
Sample
f9b60350765a3a38128c82e830b2535068ea80e916c5344506390c759f88f023.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9b60350765a3a38128c82e830b2535068ea80e916c5344506390c759f88f023.doc
Resource
win10v2004-20240226-en
General
-
Target
f9b60350765a3a38128c82e830b2535068ea80e916c5344506390c759f88f023
-
Size
58KB
-
MD5
6e51fdec390d7284bec3e6424f14c852
-
SHA1
5096ca0de8b6ca27dcdcf5790a2cb99566f03e04
-
SHA256
f9b60350765a3a38128c82e830b2535068ea80e916c5344506390c759f88f023
-
SHA512
f3ecc9887ac3b06963c12c91d0c2e0c5df865b2e12be21d435624d36658d68b3934cbce58b3bb514f516548a59a3540a7efd060fc52548b53e082f658d6ec2ec
-
SSDEEP
768:buKSWcV9iF7gWMsdMVk1kwbe1cdqj6Qm7ZDQxz99oinZ:b+WS9iF7gWMsdlCwK1cdqfCDQ3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f9b60350765a3a38128c82e830b2535068ea80e916c5344506390c759f88f023.doc windows office2003
ThisDocument