Behavioral task
behavioral1
Sample
5e838e3ea2275d45224acad45fa1ef8a293a316bfe01633f1413f6addd4015b9.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e838e3ea2275d45224acad45fa1ef8a293a316bfe01633f1413f6addd4015b9.doc
Resource
win10v2004-20240802-en
General
-
Target
5e838e3ea2275d45224acad45fa1ef8a293a316bfe01633f1413f6addd4015b9
-
Size
36KB
-
MD5
8a4d50399fa413d02b96e089cb1d919a
-
SHA1
440eb3802ddf75867234c5c06307ee847c5a8b04
-
SHA256
5e838e3ea2275d45224acad45fa1ef8a293a316bfe01633f1413f6addd4015b9
-
SHA512
758e23d1d8cfff811166f73f6eff3cbadba432a826616acdae2880bb8b392334186a0385c42fc998ca0272dab469052b29053286179dba679b044409848a144e
-
SSDEEP
384:S/8iSUR/8djSt4/kcQ7BBxXJ4KB4yL2ub0jV7X:Sh/qpQhXWKB4XubS7
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
5e838e3ea2275d45224acad45fa1ef8a293a316bfe01633f1413f6addd4015b9.doc windows office2003
ThisDocument