Behavioral task
behavioral1
Sample
1e07eb758ffc5d4ee0920341286a9fc66f9030bba298add4613966e7c0a32e2e.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1e07eb758ffc5d4ee0920341286a9fc66f9030bba298add4613966e7c0a32e2e.doc
Resource
win10v2004-20240226-en
General
-
Target
1e07eb758ffc5d4ee0920341286a9fc66f9030bba298add4613966e7c0a32e2e
-
Size
728KB
-
MD5
71bd5c37d3e436218d3444cacd0dfc4b
-
SHA1
3db7671987357dcb413c5b5a43f8125b62c78460
-
SHA256
1e07eb758ffc5d4ee0920341286a9fc66f9030bba298add4613966e7c0a32e2e
-
SHA512
0fb7131b6790ea58ee8bb446b5198818945dc9846df608b42e48f09ba5c9268de315da472796cd877e06e9dc04ed244d40d131b1803c622ef9e8d762ace12601
-
SSDEEP
12288:jLc13VZ1udyQNI2mpYUBJ8rVp1P+N03pBkZYc77blu5oTDGVt:4Dyh+it
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1e07eb758ffc5d4ee0920341286a9fc66f9030bba298add4613966e7c0a32e2e.doc windows office2003
ThisDocument
Module1