Behavioral task
behavioral1
Sample
c4fb497effaa65225ba4632d7ec1fc9059d8c43a54de1a005dc88da936a19072.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c4fb497effaa65225ba4632d7ec1fc9059d8c43a54de1a005dc88da936a19072.doc
Resource
win10v2004-20240709-en
General
-
Target
c4fb497effaa65225ba4632d7ec1fc9059d8c43a54de1a005dc88da936a19072
-
Size
159KB
-
MD5
9ba346e48e10d14dacc29c5b8f0be5e2
-
SHA1
6e478582c5bd78ab8dcb9e3100f685c9597cb140
-
SHA256
c4fb497effaa65225ba4632d7ec1fc9059d8c43a54de1a005dc88da936a19072
-
SHA512
3f8d2f9be6e0b3c838ac1ab1157cd2a39b8aa94e808f8557f51a16dc895a00054b8944038d449d85d55631ff1535878af11f8cfc3197b883d41c7b619dc3ebdf
-
SSDEEP
768:5Mk3yA1HzkP3L07eEASmcLvJ/FnVdl8npio:5MAyQkD0yzV2xNzW
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c4fb497effaa65225ba4632d7ec1fc9059d8c43a54de1a005dc88da936a19072.doc windows office2003
ThisDocument