Behavioral task
behavioral1
Sample
5f9b27755d2ca808c36c61a21ecc178ba61a6a9f8ef7d5cb6f1c6fa7332b172f.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f9b27755d2ca808c36c61a21ecc178ba61a6a9f8ef7d5cb6f1c6fa7332b172f.doc
Resource
win10v2004-20240802-en
General
-
Target
5f9b27755d2ca808c36c61a21ecc178ba61a6a9f8ef7d5cb6f1c6fa7332b172f
-
Size
186KB
-
MD5
4aa37c8d19d56c69a120e57c0163abb6
-
SHA1
fd895c7c7c22ab45d1d14d0c756c7ce7bce91915
-
SHA256
5f9b27755d2ca808c36c61a21ecc178ba61a6a9f8ef7d5cb6f1c6fa7332b172f
-
SHA512
626677f341ac4ac8921c448e3c4d2e1ddeeb1be148faee26ce1604a22dd1efbded73d4d407644cead23b4eeb2e677663acc3e469309a59a4adf6706a05932639
-
SSDEEP
1536:P9HtP5hjxdppIacLNu3Xx8FAq8jcllSS+mnJtrpqWCDSy:P9HtP5Ga2oRn6ZpqWCDS
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
5f9b27755d2ca808c36c61a21ecc178ba61a6a9f8ef7d5cb6f1c6fa7332b172f.doc windows office2003