Behavioral task
behavioral1
Sample
adbb06d92f036c14b90e4cbc210ffdc6b129cd4c8c7e4e9db6f67e78b56af4cd.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
adbb06d92f036c14b90e4cbc210ffdc6b129cd4c8c7e4e9db6f67e78b56af4cd.doc
Resource
win10v2004-20240802-en
General
-
Target
adbb06d92f036c14b90e4cbc210ffdc6b129cd4c8c7e4e9db6f67e78b56af4cd
-
Size
43KB
-
MD5
3ca7dae77e2f265d6adfc0918bb2fb1e
-
SHA1
6d0ee171920d95ba0d15b476f1bbef2204918b98
-
SHA256
adbb06d92f036c14b90e4cbc210ffdc6b129cd4c8c7e4e9db6f67e78b56af4cd
-
SHA512
d35246b0051ee24c65719c65518f02f3d45806732f135f6dcb19c66fae58349b3f0a07b14d0735eb751af09162000e7b7ca9922b975a71c8f4cbc1072f3cc136
-
SSDEEP
384:W8iS8px8SMDHv516+pQap8LtdIymPZ9JPTOl0kyzQ/vx3VFDWDtN0j0j2/ot:23yPO+pQaSL3bYZ9JHWplFEc/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
adbb06d92f036c14b90e4cbc210ffdc6b129cd4c8c7e4e9db6f67e78b56af4cd.doc windows office2003
ThisDocument
NewMacros