Behavioral task
behavioral1
Sample
db7a178a040bb50a633a3d921d7a27c59c9d721a3aca30ce8866996314a8e22e.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
db7a178a040bb50a633a3d921d7a27c59c9d721a3aca30ce8866996314a8e22e.doc
Resource
win10v2004-20240802-en
General
-
Target
db7a178a040bb50a633a3d921d7a27c59c9d721a3aca30ce8866996314a8e22e
-
Size
46KB
-
MD5
d6d6346c283fba843e63cf8066bf868a
-
SHA1
bcbd1bae489772df9ff120f9b7dbaae72c03210f
-
SHA256
db7a178a040bb50a633a3d921d7a27c59c9d721a3aca30ce8866996314a8e22e
-
SHA512
644811ad8acfc959f044d5423feea398b52af4a32f7db552eaa579be2b9006a6a59921a0f736eaf1de33af22108ebfeb37a6a3ec407ebecd0b28e52454ad3135
-
SSDEEP
384:aGGDdmim/HCgefjM+ETQ32te/1xiixwL6qT7+pek/iyL8gLDkyzQ/zDQZSQg0jtD:dQjkmwLn+pekqyftWzyABQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
db7a178a040bb50a633a3d921d7a27c59c9d721a3aca30ce8866996314a8e22e.doc windows office2003