Behavioral task
behavioral1
Sample
9f7fad4567998e8a18c2e252cd949b97ea4f7aca1810aeeaaf603d4fc160bcb0.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9f7fad4567998e8a18c2e252cd949b97ea4f7aca1810aeeaaf603d4fc160bcb0.doc
Resource
win10v2004-20241007-en
General
-
Target
9f7fad4567998e8a18c2e252cd949b97ea4f7aca1810aeeaaf603d4fc160bcb0
-
Size
41KB
-
MD5
10f095e72f84778ad8b8bdab91ea96f0
-
SHA1
58b665c37968729d1245c7bb8397397e378c2f44
-
SHA256
9f7fad4567998e8a18c2e252cd949b97ea4f7aca1810aeeaaf603d4fc160bcb0
-
SHA512
8f8ea228e35bac515e1ab48c97a92e7241b2ae9503e1fd51d8f15f51ee77e81446dc35cf7d461370edd41dbef49436c2ee12ccb90091cfe285d5772d7b4c930c
-
SSDEEP
384:MHOgiS8px8SMDDkoUDk22DN+7qsB+j7jPTlDhTweUtIcEPKqecz+:SW3ywoU0wqFPlDhTjiEPKqeG
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9f7fad4567998e8a18c2e252cd949b97ea4f7aca1810aeeaaf603d4fc160bcb0.doc windows office2003
ThisDocument
Unit