Behavioral task
behavioral1
Sample
994eb8012115671af15d3fc16815ea8e416b8ef83f43bc08360f569572bb65e8.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
994eb8012115671af15d3fc16815ea8e416b8ef83f43bc08360f569572bb65e8.doc
Resource
win10v2004-20240419-en
General
-
Target
994eb8012115671af15d3fc16815ea8e416b8ef83f43bc08360f569572bb65e8
-
Size
1.3MB
-
MD5
d01f3420038f1e37c46171436b95c2c8
-
SHA1
06f698eea9f6684e7488644c793e07cde04ca4c9
-
SHA256
994eb8012115671af15d3fc16815ea8e416b8ef83f43bc08360f569572bb65e8
-
SHA512
bf2f3d5573b54d277b562f1b97da0aed167da7312da96cec87aac8dd782015722a5e8c056a663794b5c1a7e0fb398aa33d8b8d51b915d582457e6e68beace10f
-
SSDEEP
12288:UY8XYz/8GI34dtW0IoVDLAcOfeWpb771JN4Zp9RJBoY/KGILBNZUWs2DxbOmXXI6:Hn63/0IHmWpb77moY/KGSUWOmX46S
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
994eb8012115671af15d3fc16815ea8e416b8ef83f43bc08360f569572bb65e8.doc windows office2003