Behavioral task
behavioral1
Sample
d07e28d5ccf513db73ededac2ebe12d7ef2cffbb8cbdb15f90572eedd1810213.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d07e28d5ccf513db73ededac2ebe12d7ef2cffbb8cbdb15f90572eedd1810213.doc
Resource
win10v2004-20220812-en
General
-
Target
d07e28d5ccf513db73ededac2ebe12d7ef2cffbb8cbdb15f90572eedd1810213
-
Size
133KB
-
MD5
0cdc69078d236cce1419fc8989240740
-
SHA1
cca4920e58b41bc10173e3ea40edeb510da9dcb2
-
SHA256
d07e28d5ccf513db73ededac2ebe12d7ef2cffbb8cbdb15f90572eedd1810213
-
SHA512
8a3593d807ed25cfa2b69a4667675972c1b6fce3ec1d76f7e1a3368a369e7af22d894bf90a0e5fab97ebdd5efc9dc3373739f1bb732f18d1d54fffd8516d23e6
-
SSDEEP
3072:IJZ8YkObpMH+vZjy+eVDEL5EpKqZJZv0w1j/lgrtx:i8YzdowZe85OK2Jh0wZNytx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d07e28d5ccf513db73ededac2ebe12d7ef2cffbb8cbdb15f90572eedd1810213.doc windows office2003
ThisDocument
Module1
Module2
Module3