Behavioral task
behavioral1
Sample
d99e7bd2483a0ee7f57568fb848ed194681464d3bde0d9921649f0faf2774e2d.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d99e7bd2483a0ee7f57568fb848ed194681464d3bde0d9921649f0faf2774e2d.doc
Resource
win10v2004-20240802-en
General
-
Target
d99e7bd2483a0ee7f57568fb848ed194681464d3bde0d9921649f0faf2774e2d
-
Size
34KB
-
MD5
641ce002c5bf19c487930a731f1bfbb5
-
SHA1
ed3b6bbe18124367ab703d3c160e7d067eed719e
-
SHA256
d99e7bd2483a0ee7f57568fb848ed194681464d3bde0d9921649f0faf2774e2d
-
SHA512
c34c5a9e536728f1a4b3a88eedfe3451555dfc6a63655f56d47db63bc33ecc8168e1eb2b4ae2ac04921b33e2ff526f1196ba34b0f8d7e4c9506d961eedb1b9cf
-
SSDEEP
384:MU1iSX3mSBqEIymT/ljap50jWtF5qbFeFaIH:MuqzhYjAFeFaM
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d99e7bd2483a0ee7f57568fb848ed194681464d3bde0d9921649f0faf2774e2d.doc windows office2003
ThisDocument
NewMacros