Behavioral task
behavioral1
Sample
b10d4465157273d3b106ed97b74147ddb35efb344cbd843e54f16391caae51e0.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b10d4465157273d3b106ed97b74147ddb35efb344cbd843e54f16391caae51e0.doc
Resource
win10v2004-20241007-en
General
-
Target
b10d4465157273d3b106ed97b74147ddb35efb344cbd843e54f16391caae51e0
-
Size
77KB
-
MD5
72bf256119b652762d7f57f3873cfcd0
-
SHA1
1998cd15554674254453b9d1bad3f7e8c9bea5cc
-
SHA256
b10d4465157273d3b106ed97b74147ddb35efb344cbd843e54f16391caae51e0
-
SHA512
e38444218e794249b11088bc3b39ffd3a0ddde0c9779505409e407a41f18b14da15f906aceafb864c267303bc5ef08ee5aa45453acdf762a71b60f9b8f19d481
-
SSDEEP
768:Uoo2oooogG7oXoooo7ooQoooDoooooIoo4pJcaUitGAlmrJpmxlzC+w99NB33yhk:TptJlmrJpmxlRw99NBnyA1dfafKI+j
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
b10d4465157273d3b106ed97b74147ddb35efb344cbd843e54f16391caae51e0.doc windows office2003
YXKjrzjwwzDo
NUADRhErKABjQ
WMWslEJoNi