Behavioral task
behavioral1
Sample
5bfc6fd347a427976ea5092dc850df6c1516bfc14d14588f096d37db54ed20fb.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5bfc6fd347a427976ea5092dc850df6c1516bfc14d14588f096d37db54ed20fb.doc
Resource
win10v2004-20240508-en
General
-
Target
5bfc6fd347a427976ea5092dc850df6c1516bfc14d14588f096d37db54ed20fb
-
Size
32KB
-
MD5
bd3f4a1d94d7ce3996887a7bd48500df
-
SHA1
5dc0fdd9cd6396be1b13e6e2f9be1b4229440719
-
SHA256
5bfc6fd347a427976ea5092dc850df6c1516bfc14d14588f096d37db54ed20fb
-
SHA512
7d7e28b8040aa9d1440db66750ea1956134ecdab2035243332de9ff3d757b2ef1d49e0e28261724174f258c12becbb46ac3f7478abc3a6d241a2b2973d58b2f3
-
SSDEEP
384:fgXonFUiSJPw+QD1afonwqZLg50jMstgA:IXonZ+k8et8
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
5bfc6fd347a427976ea5092dc850df6c1516bfc14d14588f096d37db54ed20fb.doc windows office2003
ThisDocument
Module1