Behavioral task
behavioral1
Sample
9599a057bcf16f2fa0153d7da47b3fda3d7aea0bcb67d071c1f8be68ab25f3af.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9599a057bcf16f2fa0153d7da47b3fda3d7aea0bcb67d071c1f8be68ab25f3af.doc
Resource
win10v2004-20240802-en
General
-
Target
9599a057bcf16f2fa0153d7da47b3fda3d7aea0bcb67d071c1f8be68ab25f3af
-
Size
143KB
-
MD5
ad3630c37d15762c5e84014a398071f4
-
SHA1
ae3d20b7e52087f736f63ff60ba839e14c9fa3ac
-
SHA256
9599a057bcf16f2fa0153d7da47b3fda3d7aea0bcb67d071c1f8be68ab25f3af
-
SHA512
441fb0c8e7fbfa3a501e8518e651e67a1ad42a40e2c0456a3abc377b2695b8c4cf8b9feae562fb83b43b848d8f7b4edfe30e9fdb3618d13c273a66ee81b58575
-
SSDEEP
1536:tUPk7ER33FxU1O5DBBqqNHMVnKcjvRl1qaQLl6HNpi/vOWXIdikNZdMLL:CPO+33VNBqcHJKMj/vBGE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9599a057bcf16f2fa0153d7da47b3fda3d7aea0bcb67d071c1f8be68ab25f3af.doc windows office2003
jLcXWojrzrml
aBZnjYBCiRSmjb
VvQmOiSSq
fKTjKEiFvaWHX