Behavioral task
behavioral1
Sample
1aca77950f7168fa24b7e71c00f0230275f3ba3c93d60993b195cc335797be01.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1aca77950f7168fa24b7e71c00f0230275f3ba3c93d60993b195cc335797be01.doc
Resource
win10v2004-20240508-en
General
-
Target
1aca77950f7168fa24b7e71c00f0230275f3ba3c93d60993b195cc335797be01
-
Size
73KB
-
MD5
bfaec46126e2573b2b27e324f04d5d12
-
SHA1
17f2b75e5635ba08555b8150a88cc3e34e586371
-
SHA256
1aca77950f7168fa24b7e71c00f0230275f3ba3c93d60993b195cc335797be01
-
SHA512
13c883b59d4b7d546582a7c570154fb6c4694628490d44a178521b952e939dcc027355f2199c069dab31c16b4d87bfaf11080ddb22268a905978231f546a882f
-
SSDEEP
1536:N5/Z/267ZdGum30Mz3g3nDD3p+pekiSg:N5B/B7ZUv37
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1aca77950f7168fa24b7e71c00f0230275f3ba3c93d60993b195cc335797be01.doc windows office2003