Behavioral task
behavioral1
Sample
77cbf6cc31fa9788b7e11b1ecfe228d1d1b391ff5cf212d3577960666bed55fd.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77cbf6cc31fa9788b7e11b1ecfe228d1d1b391ff5cf212d3577960666bed55fd.doc
Resource
win10v2004-20240709-en
General
-
Target
77cbf6cc31fa9788b7e11b1ecfe228d1d1b391ff5cf212d3577960666bed55fd
-
Size
55KB
-
MD5
fd31607bcdf12649a50c3fdee0d15e24
-
SHA1
bb2c1a1442fd0982dddb3e47b7923f7a9aa1eb5e
-
SHA256
77cbf6cc31fa9788b7e11b1ecfe228d1d1b391ff5cf212d3577960666bed55fd
-
SHA512
f20d5f057ed4e9e445f3803b3832336f415d71e0b904b89e52862d0670984033eebf26aa3ea6aa2e73149366f84fbbde6394bb333f3c616bf6f3d487bb667e9b
-
SSDEEP
384:hTu/5iSeCQLQpYx2js+XuY+JHIX+peW/ih0YH9cvrkyzQ/RwTFXgoLvXwMZEiS8F:MQL+qwXuXVIX+peWqliRWRwqy93y
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
77cbf6cc31fa9788b7e11b1ecfe228d1d1b391ff5cf212d3577960666bed55fd.doc windows office2003