Behavioral task
behavioral1
Sample
ce42f76b779f821e796a9d26c1178043d38320894dc8f5c1ff4021a5c8932152.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce42f76b779f821e796a9d26c1178043d38320894dc8f5c1ff4021a5c8932152.doc
Resource
win10v2004-20220812-en
General
-
Target
ce42f76b779f821e796a9d26c1178043d38320894dc8f5c1ff4021a5c8932152
-
Size
55KB
-
MD5
de82daf570f05f4ec94a3d1f9f31e174
-
SHA1
f2f6394370c6d2fb8d82463a1200b5fbb76c9b7b
-
SHA256
ce42f76b779f821e796a9d26c1178043d38320894dc8f5c1ff4021a5c8932152
-
SHA512
d6a79c48304805b6bba56cad7d5df4b06c1c9eec7be66ab7771177e08b0a8e85c7938ddd62c4ee769f292dcf2b189ff0c1926867d559b470a3a86df1369cfdd5
-
SSDEEP
384:KxIVGZUW7FjiSHuT7UZi6mvdPNZ58Bomif9GYjfXlEu50dV6fV/rqgSepwGtjTgV:K+wUd7UoPRZTl6ofV/z/PTgOhrcR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ce42f76b779f821e796a9d26c1178043d38320894dc8f5c1ff4021a5c8932152.doc windows office2003
ThisDocument
Module1
Module2