Behavioral task
behavioral1
Sample
b57a7ae7713c20f440a05c90b304ce9a9bef9d06a0a09af7244d9127e0a6fbff.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b57a7ae7713c20f440a05c90b304ce9a9bef9d06a0a09af7244d9127e0a6fbff.doc
Resource
win10v2004-20240508-en
General
-
Target
b57a7ae7713c20f440a05c90b304ce9a9bef9d06a0a09af7244d9127e0a6fbff
-
Size
35KB
-
MD5
f9af364d20bbcdc7da8d6e7d923d4683
-
SHA1
ca49e314cda4a715c39afd3bb0449661cf9163ce
-
SHA256
b57a7ae7713c20f440a05c90b304ce9a9bef9d06a0a09af7244d9127e0a6fbff
-
SHA512
3bcae8c1da6b5bc64bb5151059632305b40e0a0f9b042a008233a1a829bc33af9f5267d05e56875064105118e97b0228a15f99d1f48aac977d1bc7655a34de0a
-
SSDEEP
192:i9nuUZEvAqetQy6/6rJ984woO+QHj180bYvTSuY8v250jvoMwAOgsZDOcw2piFTK:iB/iSJPw+QD18jSbR50jvoMMzs9qtv
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b57a7ae7713c20f440a05c90b304ce9a9bef9d06a0a09af7244d9127e0a6fbff.doc windows office2003
ThisDocument
efszinmwb