Behavioral task
behavioral1
Sample
cdedce02dc0bcc924819ee24fdc9a30a1d2532085b4e49d0fa65378cd2b3eee3.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cdedce02dc0bcc924819ee24fdc9a30a1d2532085b4e49d0fa65378cd2b3eee3.doc
Resource
win10v2004-20220901-en
General
-
Target
cdedce02dc0bcc924819ee24fdc9a30a1d2532085b4e49d0fa65378cd2b3eee3
-
Size
14KB
-
MD5
a2994fee1b77e9c4d4c89cf985108ba0
-
SHA1
69d918d743a86d572d6c6ce7f5f8986eb4eb6302
-
SHA256
cdedce02dc0bcc924819ee24fdc9a30a1d2532085b4e49d0fa65378cd2b3eee3
-
SHA512
869adaeccabfb3491d77b514181f0bc2978c40c0454b729b57265f607e859b86b79972ac7af34d248453242e838484adcfe2870f4e3d3bd3c9de4bebbc817995
-
SSDEEP
192:u9ldz4TgoFXb2S0jk28ythwexGD8PpMkB6OidGeC5pX3mtSnPqHafD2:wldkkS0jD1rvcOiifX3mt+CZ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cdedce02dc0bcc924819ee24fdc9a30a1d2532085b4e49d0fa65378cd2b3eee3.doc windows office2003
ThisDocument
NewMacros