Behavioral task
behavioral1
Sample
5767890e00907cf5497fd81d5be470eb66172af14802ae1fff17da79f718d148.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5767890e00907cf5497fd81d5be470eb66172af14802ae1fff17da79f718d148.doc
Resource
win10v2004-20240802-en
General
-
Target
5767890e00907cf5497fd81d5be470eb66172af14802ae1fff17da79f718d148
-
Size
288KB
-
MD5
afbee318dc77b00e46c59eda219c9dd3
-
SHA1
e5c4a78cb4e8cbbcdc5cd1772d2be287a5199b12
-
SHA256
5767890e00907cf5497fd81d5be470eb66172af14802ae1fff17da79f718d148
-
SHA512
7a8cdb7843423ea948004b06fb5c37a6663dd7f753cfb707edca0e0d64c62ee2eb75724b3e482b74172b389144a298f3e88212dc7846912f8e06db58440ff608
-
SSDEEP
6144:hXtVRA/MSmHKIoRmMtg8D6GG2tJFAckC/q3qfYaxelEIjvB4krVES82zHzNjQyWz:JB7QTc3IJ3wRk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5767890e00907cf5497fd81d5be470eb66172af14802ae1fff17da79f718d148.doc windows office2003
ThisDocument