Behavioral task
behavioral1
Sample
d301c239d6a10f9d81381c02ca75e0c6078f9183a774cdb36c1c847560d67d6d.doc
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d301c239d6a10f9d81381c02ca75e0c6078f9183a774cdb36c1c847560d67d6d.doc
Resource
win10v2004-20230220-en
General
-
Target
d301c239d6a10f9d81381c02ca75e0c6078f9183a774cdb36c1c847560d67d6d
-
Size
260KB
-
MD5
cb356467a5954f3976cc0448c0311f80
-
SHA1
4527e8f8a649826b74e0dbbef56e109ac45338b6
-
SHA256
d301c239d6a10f9d81381c02ca75e0c6078f9183a774cdb36c1c847560d67d6d
-
SHA512
1cf634a0ad1c64cf0ff7ea60b6977413838d511e2d1951b96e509c1c1a5dfa81557fe70d206a88129612a22f94afb84435f22dca48a2a0054145a185a533acd5
-
SSDEEP
3072:0zp2tQl+CySMcBxPGbfquCJLiOfSSdlP3gneWHzZK3:62t8+2NmfqBclZK3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d301c239d6a10f9d81381c02ca75e0c6078f9183a774cdb36c1c847560d67d6d.doc windows office2003
ThisDocument