Behavioral task
behavioral1
Sample
8dfccf5cbd3ceb33070829d236422336f6a9ec349200c91f32bab28a81a23edc.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8dfccf5cbd3ceb33070829d236422336f6a9ec349200c91f32bab28a81a23edc.doc
Resource
win10v2004-20221111-en
General
-
Target
8dfccf5cbd3ceb33070829d236422336f6a9ec349200c91f32bab28a81a23edc
-
Size
2.5MB
-
MD5
12fd38d94ed851a349a49aa6f470b2f5
-
SHA1
c8bf3448ad724bdbc7e9906825f2e88cf737e8cb
-
SHA256
8dfccf5cbd3ceb33070829d236422336f6a9ec349200c91f32bab28a81a23edc
-
SHA512
a540511649fefea1236c6863af2ff8d648c34ba34974b8dfb51474a657949113aae7071419020fa89bb45762d057236bffccd3b53c0afd8e434106d01a3aeebd
-
SSDEEP
12288:fb2ko4jCRjcVVcCVxurm9SmWOomJDeUfQInUNkdCjrqHGJRtllrcyLij0ImGfRBd:DQ8x
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8dfccf5cbd3ceb33070829d236422336f6a9ec349200c91f32bab28a81a23edc.doc windows office2003
ThisDocument