Behavioral task
behavioral1
Sample
10d180921c2f48dc815031715a064f71a56827cf8d7edb17f6680d2d1a2e6892.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
10d180921c2f48dc815031715a064f71a56827cf8d7edb17f6680d2d1a2e6892.doc
Resource
win10v2004-20240802-en
General
-
Target
10d180921c2f48dc815031715a064f71a56827cf8d7edb17f6680d2d1a2e6892.doc
-
Size
43KB
-
MD5
402ffa48b25c4c12cf9fad3a694433c8
-
SHA1
a79afddba7ba146b95190e60294c1f26c65094a9
-
SHA256
10d180921c2f48dc815031715a064f71a56827cf8d7edb17f6680d2d1a2e6892
-
SHA512
2d7446005e7b48559b65d25ab5e72720d154c6a51b5dcec76ee669d3f0a0b7dcc8c7dc3b1b15eeb12a8351a4184f606457dd0c9b0d35f5297606af698a89742e
-
SSDEEP
768:cYmyd40ZLLT49g8b8o8o818o8h8o8o8u8j8o828o8V8o8o8r888o8o8u8o8o8o8F:Xe0ZUVIXXiX2XXdQXFXCXX4DXXdXXXh0
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
10d180921c2f48dc815031715a064f71a56827cf8d7edb17f6680d2d1a2e6892.doc.doc windows office2003