Behavioral task
behavioral1
Sample
91b010ca92470edf3d33b7b530af8a2595fa4117dd4774d14779e077546eb706.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
91b010ca92470edf3d33b7b530af8a2595fa4117dd4774d14779e077546eb706.doc
Resource
win10v2004-20240709-en
General
-
Target
91b010ca92470edf3d33b7b530af8a2595fa4117dd4774d14779e077546eb706
-
Size
37KB
-
MD5
643f075965c30e78a7feee85765358af
-
SHA1
17979b5a154fca961918181f647117c5ad91b105
-
SHA256
91b010ca92470edf3d33b7b530af8a2595fa4117dd4774d14779e077546eb706
-
SHA512
cc2ff1096013136d1f124c95430fb04fd65b215099aa01c2dbfc53ea949bae6c7b9b4341f46c90b9e6ac2a99b9a45f9395ae91d0d67f86eb256f37c2b0a0c88b
-
SSDEEP
384:wR6iSupx+YupYxwG/1Vtj8K6l+pwifJbZlGVQcqiWYA01hs:gX+YyMwGN8K6l+pwif9ZUicqfdo
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
91b010ca92470edf3d33b7b530af8a2595fa4117dd4774d14779e077546eb706.doc windows office2003
ThisDocument
NewMacros