Behavioral task
behavioral1
Sample
a2b43952ce166ba9f88380c4ab4caa77786912656e896534445cb3cbcf30d7a4.unknown
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a2b43952ce166ba9f88380c4ab4caa77786912656e896534445cb3cbcf30d7a4.unknown
Resource
win10v2004-20240802-en
General
-
Target
a2b43952ce166ba9f88380c4ab4caa77786912656e896534445cb3cbcf30d7a4.unknown
-
Size
24KB
-
MD5
50a8ee172a3d236cf74462963df5012b
-
SHA1
1d8c96b801f07bd36d37e39e7195492fa72ffc65
-
SHA256
a2b43952ce166ba9f88380c4ab4caa77786912656e896534445cb3cbcf30d7a4
-
SHA512
8057dda345535236a21bbc4f8eac8f1f509b6988832ea932d5c84d31f8b422c718646bae2d2d0742dd652480b0b5288389a00f47f319e9a626c1f693ce816d10
-
SSDEEP
192:r8oK3rcd5kM7ffi4UMF1pkOvpF3EiRcx+NSzfxmrmE76tNY2pCumJ0pQrXVjavmu:gGekfnVxVNOmrmEu3YcrmSpC1u
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
a2b43952ce166ba9f88380c4ab4caa77786912656e896534445cb3cbcf30d7a4.unknown.unknown .doc windows office2003