Behavioral task
behavioral1
Sample
8a36944d0e38eaf7b5c9b621bb77bb6c964f095483c5f1469cc2ad66e85a408c.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8a36944d0e38eaf7b5c9b621bb77bb6c964f095483c5f1469cc2ad66e85a408c.doc
Resource
win10v2004-20240802-en
General
-
Target
8a36944d0e38eaf7b5c9b621bb77bb6c964f095483c5f1469cc2ad66e85a408c
-
Size
54KB
-
MD5
44015e02268513bb70f8560b318e34c9
-
SHA1
1c934dcfe95db4a17db8c979a4996e41a53fd499
-
SHA256
8a36944d0e38eaf7b5c9b621bb77bb6c964f095483c5f1469cc2ad66e85a408c
-
SHA512
86a259795ede1776c7925fd03d82b5af9addf6da141c4342173cd44c355fa2be3d1377805c8610a92d9cc3e8f392728e221f98ea7565b7392e9c0021610fe3a5
-
SSDEEP
384:LE8iSsqdg1vA97Z15thpNyE89wHVftHU7T6xRzm/MA0jO0Btb/hi:L5+1o95thphttIT6xRqpQBi
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8a36944d0e38eaf7b5c9b621bb77bb6c964f095483c5f1469cc2ad66e85a408c.doc windows office2003
ThisDocument
NewMacros