Behavioral task
behavioral1
Sample
4b38a4cb923860a569e222a72e87abd97cac53e4c0d6738bd1f4db69b34746be.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b38a4cb923860a569e222a72e87abd97cac53e4c0d6738bd1f4db69b34746be.doc
Resource
win10v2004-20241007-en
General
-
Target
4b38a4cb923860a569e222a72e87abd97cac53e4c0d6738bd1f4db69b34746be
-
Size
540KB
-
MD5
65b909817684749d5e4a2c9fdfb35193
-
SHA1
bbdcee080e7df87e944774e64b3a6ff13e620692
-
SHA256
4b38a4cb923860a569e222a72e87abd97cac53e4c0d6738bd1f4db69b34746be
-
SHA512
21a053d66e464f9ec31f95a25e6e963e7e9fbc14d407b612c3aa3bf164ababf87b81017dc548cd23d9117319b1a915e5a6df9860bb6e73acbb7df578a82ff3a7
-
SSDEEP
12288:JeFuMHQqstgiDUhGvvhrfIetbw2+1GM2d940c:0IDeGvvhrfq
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
4b38a4cb923860a569e222a72e87abd97cac53e4c0d6738bd1f4db69b34746be.doc windows office2003
ThisDocument
NewMacros