Behavioral task
behavioral1
Sample
a474f85bae9fe1f702af66093264cac9be9f8eb9de88e6478ed81d4512dd2513.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a474f85bae9fe1f702af66093264cac9be9f8eb9de88e6478ed81d4512dd2513.doc
Resource
win10v2004-20240709-en
General
-
Target
a474f85bae9fe1f702af66093264cac9be9f8eb9de88e6478ed81d4512dd2513
-
Size
30KB
-
MD5
68bc25652d7c957bb2e38bf08cbc29b6
-
SHA1
8aa49fd09dcad64e112ebcf9736d6922b60175c9
-
SHA256
a474f85bae9fe1f702af66093264cac9be9f8eb9de88e6478ed81d4512dd2513
-
SHA512
d9e87f1d2aea6ee8c2100da6c40a8f2f38075d8dedabf1e408f06ad7813686f6e624d60f71f710e330a1bf779c575b48b8d033c740bbee0db1c28af7f52dd3fd
-
SSDEEP
192:OaIlLZEvA+6/6rNavrgYjk+4bWlMYTxsud3cvP+rDBLg0jw2tqflTXPa:TE8iSwvxjk+tMYN30P+rDZg0j/tq9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a474f85bae9fe1f702af66093264cac9be9f8eb9de88e6478ed81d4512dd2513.doc windows office2003
ThisDocument
NewMacros