Behavioral task
behavioral1
Sample
ba7a050a6b8fc7000dcbef380fdae0692cd36e6f0680aeda2919f4f1d57b4f3d.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba7a050a6b8fc7000dcbef380fdae0692cd36e6f0680aeda2919f4f1d57b4f3d.doc
Resource
win10v2004-20240709-en
General
-
Target
ba7a050a6b8fc7000dcbef380fdae0692cd36e6f0680aeda2919f4f1d57b4f3d
-
Size
33KB
-
MD5
00ac34edd44471254a1c06d4c2ad6ccd
-
SHA1
440f0f2c98f608ae2c9cbe3ba2c772aefddb8f23
-
SHA256
ba7a050a6b8fc7000dcbef380fdae0692cd36e6f0680aeda2919f4f1d57b4f3d
-
SHA512
7b7da4cf6e24526225ccd4faa96109453c18ed717604d9c694a11e5b70a62623376829dad6d183e0ae9bf4e21c1708b574993ae19c55d3c05403a05864991a4f
-
SSDEEP
192:tfWpEsq6/6ruRD7/9uSAq9LVk28Ut9YLeojM/MaXKB4Q6TqqG0jZy2y+a:tPiSux1uSVeRUt2M/RXKB4QcqqG0jPy
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ba7a050a6b8fc7000dcbef380fdae0692cd36e6f0680aeda2919f4f1d57b4f3d.doc windows office2003
ThisDocument
NewMacros