Behavioral task
behavioral1
Sample
9fec8cc46a66a9a89050eb179a9750b22fb982537d3b3d598d79c26d989e3a53.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9fec8cc46a66a9a89050eb179a9750b22fb982537d3b3d598d79c26d989e3a53.doc
Resource
win10v2004-20240802-en
General
-
Target
9fec8cc46a66a9a89050eb179a9750b22fb982537d3b3d598d79c26d989e3a53
-
Size
47KB
-
MD5
4f5ffe8345d494729728f79fa73d87c2
-
SHA1
34b57d11ec2475339c647c66ae30978293223e0c
-
SHA256
9fec8cc46a66a9a89050eb179a9750b22fb982537d3b3d598d79c26d989e3a53
-
SHA512
fcebbbea9fb1f4d3c49007d99aa30a9cc76bdb5c2061d8ffe1300dd028ce58b9d2504f3b3bbfb02e20b94c3f172f497ca5e2e113f83dbdfd11e5eae921146728
-
SSDEEP
384:GK8iSsqdg1vA9Spjg7h9b+izkdMdFZADB66HENDk7xqR2LR0j/txLNqe:Gn+1o9G4kdKFZSB6GENINc21sLN
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9fec8cc46a66a9a89050eb179a9750b22fb982537d3b3d598d79c26d989e3a53.doc windows office2003
ThisDocument
NewMacros