Behavioral task
behavioral1
Sample
1bd5432086ca24df6e7bd24e73ecbf19fe4424d118c0ea0eb87fa10ad7da932e.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1bd5432086ca24df6e7bd24e73ecbf19fe4424d118c0ea0eb87fa10ad7da932e.doc
Resource
win10v2004-20240704-en
General
-
Target
1bd5432086ca24df6e7bd24e73ecbf19fe4424d118c0ea0eb87fa10ad7da932e
-
Size
382KB
-
MD5
9e8ae75442dcfbf073bdc8906ef62728
-
SHA1
838de8c70a320dd46a1a23fea41f5b525655c95f
-
SHA256
1bd5432086ca24df6e7bd24e73ecbf19fe4424d118c0ea0eb87fa10ad7da932e
-
SHA512
7e02ef288dbc02cdba2f4e84769b9f5c8615459150aa077aa368e62d6731fbbdb4b4ed91497f276d0b26b54eac1ee0c130f690b9d60a7fce1238dc6c8a215368
-
SSDEEP
6144:8CHds7AEQfIEZIPHcVAvz7yds3wUbPyrb3fhhPVhzk:84s7DQ4HcOr7ss3db6r7fXPnQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1bd5432086ca24df6e7bd24e73ecbf19fe4424d118c0ea0eb87fa10ad7da932e.doc windows office2003
ThisDocument
NewMacros