Behavioral task
behavioral1
Sample
31046cbfa8c6364855b43d999a13c67fc72ef56de93a2d0dc5de23fdfb16f923.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
31046cbfa8c6364855b43d999a13c67fc72ef56de93a2d0dc5de23fdfb16f923.doc
Resource
win10v2004-20240709-en
General
-
Target
31046cbfa8c6364855b43d999a13c67fc72ef56de93a2d0dc5de23fdfb16f923
-
Size
110KB
-
MD5
779769658592b517ac94754b2e1440e0
-
SHA1
267ad7195a092fd012c5f7e7bead95ef4628d3cb
-
SHA256
31046cbfa8c6364855b43d999a13c67fc72ef56de93a2d0dc5de23fdfb16f923
-
SHA512
3806f137ce0546814c8ec2fa5f4383893547431fa63c9d8416094c7eaecd188f40361099c68278e3cc0924b1c73d3f7fa3971eb6e1a08fc4b3601187b551bf84
-
SSDEEP
1536:d9ITuk/hms5bEb+FtYuvck3fu6Va8KefAQGQ2ZiYxXJXs:d9MV/XI+FtTvcAU0STi85s
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
31046cbfa8c6364855b43d999a13c67fc72ef56de93a2d0dc5de23fdfb16f923.doc windows office2003
ThisDocument