Behavioral task
behavioral1
Sample
4c336d07261cfb01e11cd8285452eed1059c7e4a91536438ea61005a896b4793.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4c336d07261cfb01e11cd8285452eed1059c7e4a91536438ea61005a896b4793.doc
Resource
win10v2004-20241007-en
General
-
Target
4c336d07261cfb01e11cd8285452eed1059c7e4a91536438ea61005a896b4793
-
Size
67KB
-
MD5
42a77b28f82dfcea6a6ef06072b10a22
-
SHA1
3e51a2050960784c0d868d3a7a95cf5e423adbd1
-
SHA256
4c336d07261cfb01e11cd8285452eed1059c7e4a91536438ea61005a896b4793
-
SHA512
84b0fd4d1a14cb3d999c77a053cb3dc89e4dfb8e866648fcc0dbe39ae95a7ccb95ab01be41dc63a3b7f536598a1bb40fabff832cd55f0143b05f18af8ec3b80e
-
SSDEEP
768:sHcbD6alsWWRfZmJ7o5qfGEXn11a6OqoT/3y+u8dSTWe:1D6usWO0or8n+6ObT/yM
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
4c336d07261cfb01e11cd8285452eed1059c7e4a91536438ea61005a896b4793.doc windows office2003