Behavioral task
behavioral1
Sample
f693ca0340ebb4ea9680f9e75e9196e56899d605495f8369b9e3a18e52501673.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f693ca0340ebb4ea9680f9e75e9196e56899d605495f8369b9e3a18e52501673.doc
Resource
win10v2004-20240709-en
General
-
Target
f693ca0340ebb4ea9680f9e75e9196e56899d605495f8369b9e3a18e52501673
-
Size
32KB
-
MD5
42761fdb827ed1ac8163052bb5bea000
-
SHA1
dcc1c7c7848dd170efd3e6a8a357931a690c64aa
-
SHA256
f693ca0340ebb4ea9680f9e75e9196e56899d605495f8369b9e3a18e52501673
-
SHA512
68288a9fd9d26fa814da7b4bafaa6b1a01de9e8159e254ef97b23740666bef85cab2e9d43b83897630e15f3a4793fba9462818338d35c0eca4d54f6c8a4defc8
-
SSDEEP
384:hMQ8iS8px8SMD77t1YaZDZJyxAJZZZMY0jYD:hMk3yXZDZJyxAJZZZMYb
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f693ca0340ebb4ea9680f9e75e9196e56899d605495f8369b9e3a18e52501673.doc windows office2003
ThisDocument