Behavioral task
behavioral1
Sample
f026405ab921229851fde827e4364ff4916e857f82d9020f9057ace9ffa8c61d.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f026405ab921229851fde827e4364ff4916e857f82d9020f9057ace9ffa8c61d.doc
Resource
win10v2004-20240802-en
General
-
Target
f026405ab921229851fde827e4364ff4916e857f82d9020f9057ace9ffa8c61d
-
Size
46KB
-
MD5
901c6befe325890c00e73caec3d9aba7
-
SHA1
ca14b5884524bfeea18d203fdf8e4781136e7830
-
SHA256
f026405ab921229851fde827e4364ff4916e857f82d9020f9057ace9ffa8c61d
-
SHA512
1dddff2b016f778a082b059989a5ccd5519ce75d7814595d0148d6cfe5115fb5ce2a5801a25eab67a2b1edd5f0f2e9bfda46cb8cad029c94f7f96f887482ae22
-
SSDEEP
384:xiSwvxjk+tDj3V+u4tccPZ9JpqTTa+pek/i705ukyzQ/uDQ98AWf50j8n/2:Uxw+tVOZ9JpB+pekqDWu7AU//2
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f026405ab921229851fde827e4364ff4916e857f82d9020f9057ace9ffa8c61d.doc windows office2003
ThisDocument
NewMacros