Behavioral task
behavioral1
Sample
74c4e5e8804f33dfbc593208d088c50b414c201a3b3e613c5715d725024e6cfe.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
74c4e5e8804f33dfbc593208d088c50b414c201a3b3e613c5715d725024e6cfe.doc
Resource
win10v2004-20240802-en
General
-
Target
74c4e5e8804f33dfbc593208d088c50b414c201a3b3e613c5715d725024e6cfe
-
Size
36KB
-
MD5
4b7582bb03bbd37ebcf5d648e017f685
-
SHA1
4a42f97a55d430a38ec338615f22c59bae70c75d
-
SHA256
74c4e5e8804f33dfbc593208d088c50b414c201a3b3e613c5715d725024e6cfe
-
SHA512
4cb283dcd6c80495f2a3ac71cb93a24735fb21dc759fdbc60369b532194998ac923a420c7dc0abb05be3e8320c766249a7fa93cac45296bfc9d13cd72f598d07
-
SSDEEP
384:w1Z8iS8px8SMD+Tr7/g++nh0XoFalTcnf9Al7Ye9V8RldEVGDq0j1QtXR/Y:EV3yM3+nioFHf9re9V8RldEVGDqWR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
74c4e5e8804f33dfbc593208d088c50b414c201a3b3e613c5715d725024e6cfe.doc windows office2003
ThisDocument
Module1