Behavioral task
behavioral1
Sample
64575cb3accd468cb561a339f4cb36ce84a54b1ce0b634e30ca144c07b94eba2.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
64575cb3accd468cb561a339f4cb36ce84a54b1ce0b634e30ca144c07b94eba2.doc
Resource
win10v2004-20240508-en
General
-
Target
64575cb3accd468cb561a339f4cb36ce84a54b1ce0b634e30ca144c07b94eba2
-
Size
41KB
-
MD5
2eeb6dd125f8437f070281cdadefa382
-
SHA1
2733b3323abaa7abd01055725f1a633a8793ad2d
-
SHA256
64575cb3accd468cb561a339f4cb36ce84a54b1ce0b634e30ca144c07b94eba2
-
SHA512
d9526fa8b00be789faa7ec52d41f630aad71d053ebe83186a22ae3ba48ea1fd243ba2794dbd90f210a8b54db83c0c4d1c2a1a7986780ff152b37696bc1bcd400
-
SSDEEP
384:WUWNliSYji0HJggFfbZb2q50jQKTJPKMqK5jyYGKUtaftk:S6GSpXbDOTJCMNuK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
64575cb3accd468cb561a339f4cb36ce84a54b1ce0b634e30ca144c07b94eba2.doc windows office2003
ThisDocument
NewMacros