Behavioral task
behavioral1
Sample
a1aaff3f0b6b21eeda8181bc003124754eacca3aeefa1fc9499ccad99fcca820.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a1aaff3f0b6b21eeda8181bc003124754eacca3aeefa1fc9499ccad99fcca820.doc
Resource
win10v2004-20240802-en
General
-
Target
a1aaff3f0b6b21eeda8181bc003124754eacca3aeefa1fc9499ccad99fcca820
-
Size
36KB
-
MD5
a5f1bb6c4cb1b9991261f5e55ff3717f
-
SHA1
0e2bd543abfbea27873317e20b12d4e659d36d58
-
SHA256
a1aaff3f0b6b21eeda8181bc003124754eacca3aeefa1fc9499ccad99fcca820
-
SHA512
ec7734ed4f28adbc950d495c051edfdd50a7b8201e04abbd1d0401c672c9139c46f03130746b08a06e69acd471e1d3b95fda6e5b63d1a1ec6a3ff38a1acb9e7d
-
SSDEEP
384:C38iSsqdg1vA9dvjjTbrkM7o/lOVqA0jr0/1tY5:C0+1o99QM7wlY40
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
a1aaff3f0b6b21eeda8181bc003124754eacca3aeefa1fc9499ccad99fcca820.doc windows office2003
ThisDocument