Behavioral task
behavioral1
Sample
b7c38a59a5d51e79b4e9f0c50715c28a083e5ac7284991c9906a2dca535f14cb.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b7c38a59a5d51e79b4e9f0c50715c28a083e5ac7284991c9906a2dca535f14cb.doc
Resource
win10v2004-20240802-en
General
-
Target
b7c38a59a5d51e79b4e9f0c50715c28a083e5ac7284991c9906a2dca535f14cb
-
Size
45KB
-
MD5
0697ce3b4c9d40ba12738e02854a2557
-
SHA1
403ac910f62075cc490e6b5d677849b92957aaf4
-
SHA256
b7c38a59a5d51e79b4e9f0c50715c28a083e5ac7284991c9906a2dca535f14cb
-
SHA512
2180058e3ea77b9ac9da05f005522b5c5d941078923875eea08ffb3cd0417ccd5e26795ddbc2f0157fe7eb6bb56980440672e0b685771d1e3890506efeb9e832
-
SSDEEP
384:+LOTeI1H/bNSJbKEAMiSeav9LyGm/i6JSvk++n5PKJ5toe4c660jQ:+L9LTmas++5PK34c17
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b7c38a59a5d51e79b4e9f0c50715c28a083e5ac7284991c9906a2dca535f14cb.doc windows office2003