Behavioral task
behavioral1
Sample
11f5c23d7c4dee2e17b5a706afc5b1af4d4881339df716cc69613065cb489268.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
11f5c23d7c4dee2e17b5a706afc5b1af4d4881339df716cc69613065cb489268.doc
Resource
win10v2004-20240611-en
General
-
Target
11f5c23d7c4dee2e17b5a706afc5b1af4d4881339df716cc69613065cb489268
-
Size
40KB
-
MD5
b5c848c43e9f4b7dec70a6f9fca06d64
-
SHA1
ef62e391352d8626fa005bd98bf90d62ed3b61e8
-
SHA256
11f5c23d7c4dee2e17b5a706afc5b1af4d4881339df716cc69613065cb489268
-
SHA512
c008b1f82c0fe07763d2d434da9ff510fe0b1685f287ec091deda5b42ed764c43499c0309c729294f23fcf2e573240eb7769b618daa1e4ff01d41e58ff1171c9
-
SSDEEP
384:fyiSwvxjk+tzMVFF8/AFW+7o5TRKkdpCPlIy0jECt7/+Ld:f1xw+t+Fq/A3kdpCPqyjVLd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
11f5c23d7c4dee2e17b5a706afc5b1af4d4881339df716cc69613065cb489268.doc windows office2003
ThisDocument
NewMacros