Behavioral task
behavioral1
Sample
4aadd3bf071f87781910766f30baa4ebc20d6c26485b21830cee76d4d8eb8b6d.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4aadd3bf071f87781910766f30baa4ebc20d6c26485b21830cee76d4d8eb8b6d.doc
Resource
win10v2004-20240226-en
General
-
Target
4aadd3bf071f87781910766f30baa4ebc20d6c26485b21830cee76d4d8eb8b6d.doc
-
Size
35KB
-
MD5
582a41f1e6c7266f4473a396ed841261
-
SHA1
0ac2b6ceb2ec13575b3b1448e72bc7958841b899
-
SHA256
4aadd3bf071f87781910766f30baa4ebc20d6c26485b21830cee76d4d8eb8b6d
-
SHA512
738e804dea2eaf95b4652958a9da042aa64bf39a0bb8a02101fbb9b03bc6867306d466122e96937112cdf11c96139a3a9a2fc82eb1d475be8c4629d4ed3b4b3c
-
SSDEEP
192:wsWNslLZEvA+6/6r8px8SmvowzxeuQ9iBqyQYYTgN0j8ywc6tAHUkanRasQ:wC8iS8px8SMDen9BCUgN0jw/tgUkanj
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4aadd3bf071f87781910766f30baa4ebc20d6c26485b21830cee76d4d8eb8b6d.doc.doc windows office2003
ThisDocument
NewMacros