Behavioral task
behavioral1
Sample
044805bd45e1bfa0618ad7f0ca651ff691ce7b58e08b1761536aa53d38fc4667.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
044805bd45e1bfa0618ad7f0ca651ff691ce7b58e08b1761536aa53d38fc4667.doc
Resource
win10v2004-20240709-en
General
-
Target
044805bd45e1bfa0618ad7f0ca651ff691ce7b58e08b1761536aa53d38fc4667
-
Size
892KB
-
MD5
eca53d1189d86e35b7567fa2f7b94352
-
SHA1
692e2c3d905d545ae6688c8982ff3e5b7176c42f
-
SHA256
044805bd45e1bfa0618ad7f0ca651ff691ce7b58e08b1761536aa53d38fc4667
-
SHA512
4df485a9bb729c942d87066783f802427d68d161ae73fa1bace752a82b8d2830be5acff22e61bec1cdafa1ff0608d67ad0288adeb31d0a196564c25fef88d417
-
SSDEEP
24576:kEIZ4wAK74NAx5KxZTBG75gdKtYkzyHxhL:k+wZ74Nx3c75O3WyHx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
044805bd45e1bfa0618ad7f0ca651ff691ce7b58e08b1761536aa53d38fc4667.doc windows office2003
ThisDocument
Module1