Behavioral task
behavioral1
Sample
bbf8492d595000ef5e1fabad172c0d5e5bfe6278c2661007dafd7ec17cd22411.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bbf8492d595000ef5e1fabad172c0d5e5bfe6278c2661007dafd7ec17cd22411.doc
Resource
win10v2004-20240704-en
General
-
Target
bbf8492d595000ef5e1fabad172c0d5e5bfe6278c2661007dafd7ec17cd22411
-
Size
34KB
-
MD5
08f3a287e579dda542a412b93ff64d97
-
SHA1
04d2033efd8239389eacf4cd63ac53ae08c59676
-
SHA256
bbf8492d595000ef5e1fabad172c0d5e5bfe6278c2661007dafd7ec17cd22411
-
SHA512
9b93d7dbbb56b5dc29bd3df7e5a8c59bbc9263a73e4f9406f030772cc143591e4ce07a29a35ca5f0d2dc88fd595357e572d233b98484628f52134d81ccd09111
-
SSDEEP
192:SUWDlaZZEvAA6/6rNavrgYjk+4bWl26bXxZcetg76Yd5OX8LU50jfU6raT:SUWDhiSwvxjk+t2IZltRK5+F50jK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bbf8492d595000ef5e1fabad172c0d5e5bfe6278c2661007dafd7ec17cd22411.doc windows office2003
ThisDocument
NewMacros