Behavioral task
behavioral1
Sample
5d5a7e355784d6b2db1abd082117fd126c2b512cf4aa0b76561360fbef444b88.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d5a7e355784d6b2db1abd082117fd126c2b512cf4aa0b76561360fbef444b88.doc
Resource
win10v2004-20240802-en
General
-
Target
5d5a7e355784d6b2db1abd082117fd126c2b512cf4aa0b76561360fbef444b88
-
Size
32KB
-
MD5
5634a26e86eaf7761a4f0bb1cd80cd51
-
SHA1
1f5e043e1f2ead1531b0ff4f378d61009140accc
-
SHA256
5d5a7e355784d6b2db1abd082117fd126c2b512cf4aa0b76561360fbef444b88
-
SHA512
695f652dae68ebeec7383a280dfa5bdf5f4afef36e3b32932ffc2fe240389eb6573071b8914fa49f759962a84501b93e32c927a4ee288ce6345e82e99d6e8d03
-
SSDEEP
192:BRnfa0HZEvAquDUigi6/6rJ984woO+QHj1+WrXefrMiO450jZxtzL6gWCa:B7VDUKiSJPw+QD1+WArM050jZxta
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
5d5a7e355784d6b2db1abd082117fd126c2b512cf4aa0b76561360fbef444b88.doc windows office2003