Behavioral task
behavioral1
Sample
9482aed13da785f2050bee0474c2549435ad4ec69772222ce7d671db47c39bf4.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9482aed13da785f2050bee0474c2549435ad4ec69772222ce7d671db47c39bf4.doc
Resource
win10v2004-20240802-en
General
-
Target
9482aed13da785f2050bee0474c2549435ad4ec69772222ce7d671db47c39bf4
-
Size
44KB
-
MD5
b204a45e12e6eb12e4e4bc8082d26767
-
SHA1
f2b555ecbdf7bbe8a6465e8230bfd5ca70aecb16
-
SHA256
9482aed13da785f2050bee0474c2549435ad4ec69772222ce7d671db47c39bf4
-
SHA512
e1bfa208efa91b3ce21531db35a077a30c19631dff4c9cafd8ca2e8e8ba0f3fe79f0d71d42bdd2c8e79dc75fdcbd4ee3121d47232d3d5741a8312d7ab95c3124
-
SSDEEP
384:wTiSJPw+QD1bz10GbKXISStZSi1zB0k0D0j9atu6eG6sl:V+kFBbKYbtZSJkf6eG6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9482aed13da785f2050bee0474c2549435ad4ec69772222ce7d671db47c39bf4.doc windows office2003