Behavioral task
behavioral1
Sample
ad374d4bf790f01b4005f41c1349a75ba3f7585575aa78c83dd33b6bc6d241cd.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad374d4bf790f01b4005f41c1349a75ba3f7585575aa78c83dd33b6bc6d241cd.doc
Resource
win10v2004-20240802-en
General
-
Target
ad374d4bf790f01b4005f41c1349a75ba3f7585575aa78c83dd33b6bc6d241cd
-
Size
290KB
-
MD5
cadc74d31602d83d50b43c11a77366df
-
SHA1
f9de1fdf8054f6a3ecb0c0353a96d95d14fb7243
-
SHA256
ad374d4bf790f01b4005f41c1349a75ba3f7585575aa78c83dd33b6bc6d241cd
-
SHA512
fb7e4c4c279a0d5b1daf3546331780a77b61dfedf339290b0ea67b655c5ed6f9825c44abd2085e6c81125339a01e294a70bf8b17ab30f08bcd7234f37e773d84
-
SSDEEP
6144:rXtVbA/MSmHKIoRmMtg8D6GG2P0B2SqepFnoFawvee9XTIiyq0VQueLnG9/NtyOY:iJ3wRk3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ad374d4bf790f01b4005f41c1349a75ba3f7585575aa78c83dd33b6bc6d241cd.doc windows office2003
ThisDocument