Behavioral task
behavioral1
Sample
2cae9f5ec9cc1735c05e65164da179314dae3f0265f91ed457e77f0661ea5226.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2cae9f5ec9cc1735c05e65164da179314dae3f0265f91ed457e77f0661ea5226.doc
Resource
win10v2004-20240221-en
General
-
Target
2cae9f5ec9cc1735c05e65164da179314dae3f0265f91ed457e77f0661ea5226
-
Size
147KB
-
MD5
f4e24b2f9a5e5f521ea072b71dd1a8ac
-
SHA1
845022a7f53317fd6f8597103c54e1fdb7f911d7
-
SHA256
2cae9f5ec9cc1735c05e65164da179314dae3f0265f91ed457e77f0661ea5226
-
SHA512
0571442eed68b7d3c9331c7e227e09f802c1ba508d24e12df3361391a48e5f405f70b29361aeca8d481b6e3027664b1d65390515701bd40f6fe7652be995d647
-
SSDEEP
3072:I/E10b0O1gnTTTr960yDTTTTTnDRDxHi1XO49W:hlP9ANHi1XO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2cae9f5ec9cc1735c05e65164da179314dae3f0265f91ed457e77f0661ea5226.doc windows office2003