Behavioral task
behavioral1
Sample
75882c357856cf5c78eae252216d90ae8fe2acaded8dfa02452ded9ef3494e82.doc
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
75882c357856cf5c78eae252216d90ae8fe2acaded8dfa02452ded9ef3494e82.doc
Resource
win10v2004-20240508-en
General
-
Target
75882c357856cf5c78eae252216d90ae8fe2acaded8dfa02452ded9ef3494e82
-
Size
34KB
-
MD5
64145b8aedaf03d470a67349fd112b14
-
SHA1
af0c9e2cfb751f76461c917cee61318eab3b65a5
-
SHA256
75882c357856cf5c78eae252216d90ae8fe2acaded8dfa02452ded9ef3494e82
-
SHA512
52dea82fb9433814624a4ec406453457f9a9f39dde436b7676590e164d068e2783673c41d7b5f99996c326cf88b7d579022fe7324d183e067305cfa33af4afb4
-
SSDEEP
384:2I8iSsqdg1vA9Q60vA01z4+t90+r+p4/LZeSFqi:2F+1o9sYKr+pwZVEi
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
75882c357856cf5c78eae252216d90ae8fe2acaded8dfa02452ded9ef3494e82.doc windows office2003
ThisDocument
NewMacros