Behavioral task
behavioral1
Sample
502d52f0467cec572952fb7910085831bc4389bbfc20efac172974d53d68b90e.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
502d52f0467cec572952fb7910085831bc4389bbfc20efac172974d53d68b90e.doc
Resource
win10v2004-20240611-en
General
-
Target
502d52f0467cec572952fb7910085831bc4389bbfc20efac172974d53d68b90e
-
Size
35KB
-
MD5
b19a3cdfcac38edc090d9f3fa58376f7
-
SHA1
1cacde908adb23121ed819f67f7b50f39338e3e5
-
SHA256
502d52f0467cec572952fb7910085831bc4389bbfc20efac172974d53d68b90e
-
SHA512
7dace34e74f8378c0a4850270f5848f76b06b89e90670902d7f1d7d117e6dd5c80660a7d12c17e0712d3ae3d7b59feb2305a1520ebdc2c51f0565e8849dd635b
-
SSDEEP
384:/eSOBiSsqdg1vA9WgMzyBZmy7Co3MA0jD+petJ/:/eSOr+1o9szyBZF33BS+p
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
502d52f0467cec572952fb7910085831bc4389bbfc20efac172974d53d68b90e.doc windows office2003
ThisDocument
NewMacros