Behavioral task
behavioral1
Sample
f83c0dd37e41bae9a0c3662adcad9a7b7221be2f4888d2cd177f1c8494613571.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f83c0dd37e41bae9a0c3662adcad9a7b7221be2f4888d2cd177f1c8494613571.doc
Resource
win10v2004-20240802-en
General
-
Target
f83c0dd37e41bae9a0c3662adcad9a7b7221be2f4888d2cd177f1c8494613571
-
Size
34KB
-
MD5
ae756b8960aeaa1e729d482bc0249fb6
-
SHA1
97e7fdcb851e449055605f12b8c2242092ab4fda
-
SHA256
f83c0dd37e41bae9a0c3662adcad9a7b7221be2f4888d2cd177f1c8494613571
-
SHA512
f8341330944a5a0229565126b65dd0ab1b3a33b7330fe98f1e4994833075005c8843ef1e186db3e2bf88fa0bfdfb01d8c2d68922045aee9a897f8a31b6c64b41
-
SSDEEP
384:OSSiSwvxjk+ticKlcYg0jaS8tn/jQL27Ql20Z8:OSVxw+tPKa9+27QZZ8
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f83c0dd37e41bae9a0c3662adcad9a7b7221be2f4888d2cd177f1c8494613571.doc windows office2003
ThisDocument
NewMacros