Behavioral task
behavioral1
Sample
5f88ca1aaf3be23a9494d2490813fd17797025557042722e2a49d8508ec15bb1.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f88ca1aaf3be23a9494d2490813fd17797025557042722e2a49d8508ec15bb1.doc
Resource
win10v2004-20240709-en
General
-
Target
5f88ca1aaf3be23a9494d2490813fd17797025557042722e2a49d8508ec15bb1.doc
-
Size
1.3MB
-
MD5
3522ab23f2ac891db3002ea5846b155f
-
SHA1
a2a57208c98edcdb96a90b72e3bed06e6a1c35f3
-
SHA256
5f88ca1aaf3be23a9494d2490813fd17797025557042722e2a49d8508ec15bb1
-
SHA512
2be7ed61fd02bbcf24b9637ec2ebbf97270dfc1e93ce11063202deb3d0f263135244edcf21eb1e3068c8637cdd52f1e20dd1130ae79373a3553eb13f44dcd74b
-
SSDEEP
12288:OXm5/PgVHXloQgPUqCQjDaX2Ky3UCTrg06fE2z40LwfIQ2YZXXvGw4dbt0cLyMPj:OW5el9qORXxCgVc2zpkZn4dBnlq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
5f88ca1aaf3be23a9494d2490813fd17797025557042722e2a49d8508ec15bb1.doc.doc .ps1 windows office2003 polyglot
ThisDocument