Behavioral task
behavioral1
Sample
84c54ef42f58a8196925c994ac0e51c4d8dd5f4ada7dc191272548e39c1ee943.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84c54ef42f58a8196925c994ac0e51c4d8dd5f4ada7dc191272548e39c1ee943.doc
Resource
win10v2004-20240802-en
General
-
Target
84c54ef42f58a8196925c994ac0e51c4d8dd5f4ada7dc191272548e39c1ee943
-
Size
63KB
-
MD5
b47c340838f2e185e41e62c5d070b248
-
SHA1
7278283417480cb642cc64fe2dbbe3d3b1c00fb8
-
SHA256
84c54ef42f58a8196925c994ac0e51c4d8dd5f4ada7dc191272548e39c1ee943
-
SHA512
317bae1658bc95e088f4369fa4d28f36279dd7db33738ce0df2c7dffb4c915100bdf7f023c175db31cdb75d47e11adaa7b1ced1b6ab5de5933b688df6c236f6f
-
SSDEEP
768:uiyIkWvQ8x5zAA/IAkT35wO9gZKw93yqCdys8JkP:uiyO6T5wvZKw1yDdyL
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
84c54ef42f58a8196925c994ac0e51c4d8dd5f4ada7dc191272548e39c1ee943.doc windows office2003