Behavioral task
behavioral1
Sample
028ac77779f633c65a2890ad69de64b605453ed809b456dfaff5c5c17d136d28.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
028ac77779f633c65a2890ad69de64b605453ed809b456dfaff5c5c17d136d28.doc
Resource
win10v2004-20240508-en
General
-
Target
028ac77779f633c65a2890ad69de64b605453ed809b456dfaff5c5c17d136d28
-
Size
32KB
-
MD5
feebb06fb9cde906e1ed6e204e19303a
-
SHA1
3f43ebbee9623e2f4167deb9c35794fff53a864a
-
SHA256
028ac77779f633c65a2890ad69de64b605453ed809b456dfaff5c5c17d136d28
-
SHA512
63c5c02705a9abeb6b8d2f0d1eaf83565e82f7881d527bd8f3856a047f8c00adc2e08d17f121441d541366283926dc76d04525e3bd43691f8f632e72c72b3f97
-
SSDEEP
192:7UoH8AZEvAqgT8tQ6/6rJ984woO+QHj1mqOdXa/UDTgI9DtnC50ja+//tpH4/a:7UGliSJPw+QD1mqZU4gnC50jV/t94
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
028ac77779f633c65a2890ad69de64b605453ed809b456dfaff5c5c17d136d28.doc windows office2003
ThisDocument
Module1