Behavioral task
behavioral1
Sample
e8ad404b895b85113d0c83daa6e7f87b18b90b59d6c9c0411e1abc71155c307d.doc
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e8ad404b895b85113d0c83daa6e7f87b18b90b59d6c9c0411e1abc71155c307d.doc
Resource
win10v2004-20230703-en
General
-
Target
e8ad404b895b85113d0c83daa6e7f87b18b90b59d6c9c0411e1abc71155c307d
-
Size
22KB
-
MD5
41d13112f4920cef3d848c8794f7af80
-
SHA1
9fad0f012cf2f53f607c0fb80dbaf9f78e75cddc
-
SHA256
e8ad404b895b85113d0c83daa6e7f87b18b90b59d6c9c0411e1abc71155c307d
-
SHA512
10d4686241ad814407c909b7836a02f95dc716b28b955af5d4f6268f2a26a5c77121e8ddfb6f1e071551ae3273fd94f811a78b718922f30a9099afc07a606320
-
SSDEEP
192:K4QdQNahHYscn6w+g57riUD2IsIbrvFKZ77SpDzIfpTxSumvWp/ka19b:KP1hHumKrAZ770IfpNS3WpB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e8ad404b895b85113d0c83daa6e7f87b18b90b59d6c9c0411e1abc71155c307d.doc .vbs windows office2003