Behavioral task
behavioral1
Sample
a515d869a75da322c87985158750d4e12f5556b0785379d558d778e3ef481eac.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a515d869a75da322c87985158750d4e12f5556b0785379d558d778e3ef481eac.doc
Resource
win10v2004-20240709-en
General
-
Target
a515d869a75da322c87985158750d4e12f5556b0785379d558d778e3ef481eac
-
Size
36KB
-
MD5
e01f640fbceaf6a2584e49d047d89176
-
SHA1
75e0ecbfd3029a11dccecb682fffc45dbb60f2bd
-
SHA256
a515d869a75da322c87985158750d4e12f5556b0785379d558d778e3ef481eac
-
SHA512
11e5c2fd6b6068fbb8116684d904691d75ce7211d6c315c2e138baa8afc859c469b56c27a3e7ea151bef7fca9012d4e6f1b7dc23cd0634f2b35d12dd1a042d62
-
SSDEEP
384:wAMiS8px8SMDIdyK118MD32suJcXNBB3Su0jijm:d3y2yK3zD32JJcXLEud
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a515d869a75da322c87985158750d4e12f5556b0785379d558d778e3ef481eac.doc .vbs windows office2003 polyglot
ThisDocument