Behavioral task
behavioral1
Sample
e9b910d3592845f34d989eb5e6aab78fcb1f040359b1d1e29731d2449812157c.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e9b910d3592845f34d989eb5e6aab78fcb1f040359b1d1e29731d2449812157c.doc
Resource
win10v2004-20221111-en
General
-
Target
e9b910d3592845f34d989eb5e6aab78fcb1f040359b1d1e29731d2449812157c
-
Size
38KB
-
MD5
8252d6d9458d4b5a8c5a14eb0b64b619
-
SHA1
ca93eef5db1130a7d3fec669a1ddb56950004137
-
SHA256
e9b910d3592845f34d989eb5e6aab78fcb1f040359b1d1e29731d2449812157c
-
SHA512
5216f3b6673be71a671f813f02199db88db930013d190b9b4e7ecaf2da4de4eea8a451709116bcf3a09a08201b29ff0a24747607e3cca53b06edf84f08f3688a
-
SSDEEP
384:vTmbFJKyGcS2rDhZOCDZxz99wtW/txRK/A+kgALUWx0jl8:vTmbXrlrDZxz9953K/AU96C
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
e9b910d3592845f34d989eb5e6aab78fcb1f040359b1d1e29731d2449812157c.doc windows office2003
ThisDocument