Behavioral task
behavioral1
Sample
73c9d5f3dd5a3732f56ac973446df6b8ba8c6e6c8d5e628dd9f64aa146ae4a27.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
73c9d5f3dd5a3732f56ac973446df6b8ba8c6e6c8d5e628dd9f64aa146ae4a27.doc
Resource
win10v2004-20240802-en
General
-
Target
73c9d5f3dd5a3732f56ac973446df6b8ba8c6e6c8d5e628dd9f64aa146ae4a27
-
Size
109KB
-
MD5
1f9e55c9a9f2434312f2ceadfd480fd7
-
SHA1
f68e2be6ebd5bb8c7f869c33984243a80ad4a893
-
SHA256
73c9d5f3dd5a3732f56ac973446df6b8ba8c6e6c8d5e628dd9f64aa146ae4a27
-
SHA512
81f14de28ae1d36d3554b10a28730952b51794ce461ecada32cb909eb351a3f7a2a9b186c1acba3d6dd59f7fb0aefc5b1e192d3c4f6508c3933c4b7114bfca05
-
SSDEEP
1536:qks7KRNl3ArCf0p36lMMDV3HgpJMSZ0yUCZQ6iFdIBSM8HeFpvO:K7Al3KCsKWUYtZGGQ6jSM8HePO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
73c9d5f3dd5a3732f56ac973446df6b8ba8c6e6c8d5e628dd9f64aa146ae4a27.doc windows office2003
ThisDocument
LocalBrowser
STRIX
Module3
Module1
Module2