Behavioral task
behavioral1
Sample
c699f72ff3a77f6cd062e378066c0ada6cfbb66ec9bbf094289dc5e4de948c12.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c699f72ff3a77f6cd062e378066c0ada6cfbb66ec9bbf094289dc5e4de948c12.doc
Resource
win10v2004-20240226-en
General
-
Target
c699f72ff3a77f6cd062e378066c0ada6cfbb66ec9bbf094289dc5e4de948c12
-
Size
1.2MB
-
MD5
0e3aae25ce80b07854f9f0bebc318600
-
SHA1
d8b131bed9f8fb218b13bb58df2285ff8fe64da2
-
SHA256
c699f72ff3a77f6cd062e378066c0ada6cfbb66ec9bbf094289dc5e4de948c12
-
SHA512
d2ab7f8c45ad74f42f2df7e81d9a2e00ece85753d6f50c0f174114d5b5ff61e4b132d878c09d2902f0f3620b468552e97f920f72db87bf3c854e7b110fcbfae2
-
SSDEEP
24576:fAQJcgBqeZGoYTHd6f3LGydLfFOqLPrU4L4J4LXQLOa1AFB1h9Nn1KVU1h9UffwI:fhcWqeZGoYLd
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
c699f72ff3a77f6cd062e378066c0ada6cfbb66ec9bbf094289dc5e4de948c12.doc windows office2003