Behavioral task
behavioral1
Sample
da896c1e870a397ee468e9dfd2d7c359af1b553a229138de69c69576cc2ec61e.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da896c1e870a397ee468e9dfd2d7c359af1b553a229138de69c69576cc2ec61e.doc
Resource
win10v2004-20240709-en
General
-
Target
da896c1e870a397ee468e9dfd2d7c359af1b553a229138de69c69576cc2ec61e
-
Size
51KB
-
MD5
2e39e02961626f85d7bf7e6b258be712
-
SHA1
eac359a5774143d1c997960737f380806958da3f
-
SHA256
da896c1e870a397ee468e9dfd2d7c359af1b553a229138de69c69576cc2ec61e
-
SHA512
d7111629c0ecde6d2c598d70e9149b9faa36247f3651d0740e509876ec422e5a034a83ad01ddc47a6012aba2793a6902783fa078cfd2e194674dfb33c262bffe
-
SSDEEP
384:/O1eiS8px8SMDYXXB3VlKEDg16pKP8V1jDPjDBvNG5NybUniS8px8SMD:Wn3yYX5KEDg16QkVpnGPybUI3y
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
da896c1e870a397ee468e9dfd2d7c359af1b553a229138de69c69576cc2ec61e.doc windows office2003
ThisDocument