Behavioral task
behavioral1
Sample
76bc172ab851b271bbda3e7a8f411309a28282a7778df244fbbaea90176a2837.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
76bc172ab851b271bbda3e7a8f411309a28282a7778df244fbbaea90176a2837.doc
Resource
win10v2004-20240802-en
General
-
Target
76bc172ab851b271bbda3e7a8f411309a28282a7778df244fbbaea90176a2837
-
Size
45KB
-
MD5
a77aedf4933ac0424b29d1e1116d66fb
-
SHA1
2705ee9df46a332715533c187f24efd92e92fbd2
-
SHA256
76bc172ab851b271bbda3e7a8f411309a28282a7778df244fbbaea90176a2837
-
SHA512
2c707fe9276b319c041b0bc89f558f4d7859366bbf39cfe6e91d06c592053624fbe1a37ac2e6e3c58207e33cde02c0caf304378001f029c0f2af1b3186f37843
-
SSDEEP
384:FSeCrb5qTiSwvxjk+tqKyV0QtksB3bEZ6+DHre8Tp1tsQ450jFVQzyPK:FSeY55xw+tIV0QtkOQZ6AteQUOVQzP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
76bc172ab851b271bbda3e7a8f411309a28282a7778df244fbbaea90176a2837.doc windows office2003
ThisDocument