Behavioral task
behavioral1
Sample
cb32d2ea9add837965cdff0fddd76b0dacc36d56bcc971368e65a5ef27523d4a.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb32d2ea9add837965cdff0fddd76b0dacc36d56bcc971368e65a5ef27523d4a.doc
Resource
win10v2004-20220812-en
General
-
Target
cb32d2ea9add837965cdff0fddd76b0dacc36d56bcc971368e65a5ef27523d4a
-
Size
32KB
-
MD5
c93cd736b08aaff5c8dd1ead58ea51b8
-
SHA1
2158713093be04cbc16aa7f2d83fca00a3091a94
-
SHA256
cb32d2ea9add837965cdff0fddd76b0dacc36d56bcc971368e65a5ef27523d4a
-
SHA512
c5c204ff2a00508c3f00d521f69dbe09874b39d3a4e23fad7ca43582bf164ffc6a25b1bb12ca81de3a770e99afe74734788ff1fbeec647c446861854de0f3185
-
SSDEEP
192:wjIZ1OlbZEvA+6/6rrILd/Kf3HO8tW561WZJib0jFP+JvtNZoaguG22TYbExKypI:wj5MiSUR/8dWvZQb0jFP+BtN4uG2gHw
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cb32d2ea9add837965cdff0fddd76b0dacc36d56bcc971368e65a5ef27523d4a.doc windows office2003
ThisDocument