Behavioral task
behavioral1
Sample
4702ddcdabec838cb2f8d843382174156bc70256a87e74b3ef0b863af4a4c4a5.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4702ddcdabec838cb2f8d843382174156bc70256a87e74b3ef0b863af4a4c4a5.doc
Resource
win10v2004-20240802-en
General
-
Target
4702ddcdabec838cb2f8d843382174156bc70256a87e74b3ef0b863af4a4c4a5
-
Size
36KB
-
MD5
f26dcb10899259fff59020ce71bc5392
-
SHA1
8e8f4d44871dd2b6f1300b7824dea0bcfd5f551d
-
SHA256
4702ddcdabec838cb2f8d843382174156bc70256a87e74b3ef0b863af4a4c4a5
-
SHA512
97581c8364397c30d4d5068330076c53975e832525f80e139f00e45614fd278631bc17c2bea6edc4071ef7c6a3e06332a4f39a6121e18f7b67347b2e913e84fc
-
SSDEEP
384:NOZSiSJPw+QD1Ih6Jp0g50j8Jt7bvoFeFai1q:NY1+k8CdLbvoFeFaiA
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4702ddcdabec838cb2f8d843382174156bc70256a87e74b3ef0b863af4a4c4a5.doc .ps1 windows office2003 polyglot
ThisDocument
NewMacros