Behavioral task
behavioral1
Sample
e4133ecef89172216e1b1e45c8976b4d867c87bc49941e3f3c052e185bf74e60.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e4133ecef89172216e1b1e45c8976b4d867c87bc49941e3f3c052e185bf74e60.doc
Resource
win10v2004-20240709-en
General
-
Target
e4133ecef89172216e1b1e45c8976b4d867c87bc49941e3f3c052e185bf74e60
-
Size
37KB
-
MD5
6741c7b29a102a625a57b7ec89908157
-
SHA1
528995dd7332e5aeb512ac69d4b0169d7b953142
-
SHA256
e4133ecef89172216e1b1e45c8976b4d867c87bc49941e3f3c052e185bf74e60
-
SHA512
ffed1ce466d413e1e1bce1fed4a79cbca7b49f5d49a8ba2009bacdd3b1a16d20e88a2a34d686cd03ee2fa5cbf92144c102f063a81fc9d36b2181399135c15af4
-
SSDEEP
384:aOiSupx+YcwUyJVtQo7mwVCroogZwZeJ1pTYbA013okii:W+Y/Ubo7mCCrtgeZUrUUPkii
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e4133ecef89172216e1b1e45c8976b4d867c87bc49941e3f3c052e185bf74e60.doc windows office2003
ThisDocument
NewMacros