Behavioral task
behavioral1
Sample
ff42cadcc2330931d543161391a98f21f03ced156aa0764d874488f60228f7fa.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ff42cadcc2330931d543161391a98f21f03ced156aa0764d874488f60228f7fa.doc
Resource
win10v2004-20240508-en
General
-
Target
ff42cadcc2330931d543161391a98f21f03ced156aa0764d874488f60228f7fa
-
Size
37KB
-
MD5
697e5b6be7f05596b54956e1c3d0cfdf
-
SHA1
07a1e8a0c74df4c0a6a6921568b56a012ee797f9
-
SHA256
ff42cadcc2330931d543161391a98f21f03ced156aa0764d874488f60228f7fa
-
SHA512
ab4bfc6fb128f050416abe1865749a56cd2d916d7f97fcde1b17c9ab9ab47c88b0db3ba4188c6d29e8a63330ca11f9977db16709f7ae43c78ac60f728cb31baa
-
SSDEEP
384:On8iSsqdg1vA9cbVH532g7SQdrNy+pJdH50jntC:OE+1o9uHYg7bPy+pJd5
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ff42cadcc2330931d543161391a98f21f03ced156aa0764d874488f60228f7fa.doc windows office2003
ThisDocument
NewMacros