Behavioral task
behavioral1
Sample
06aba4c02220a41d53198ecd3b319a5032f6bfab9f170d92f476c22f3f14a220.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06aba4c02220a41d53198ecd3b319a5032f6bfab9f170d92f476c22f3f14a220.doc
Resource
win10v2004-20240226-en
General
-
Target
06aba4c02220a41d53198ecd3b319a5032f6bfab9f170d92f476c22f3f14a220
-
Size
112KB
-
MD5
096d54a4ce870a6ae34bd751ce747b80
-
SHA1
f1f64f0c1c67916950792389d2d63f50b8ea8517
-
SHA256
06aba4c02220a41d53198ecd3b319a5032f6bfab9f170d92f476c22f3f14a220
-
SHA512
e765a9002a09d6b5c49c08d2c03aab8ab1394f5fa28c1ddbe31aed99a2c057cb1b2fb6ca5f41684107c56c51a29efcd9fc3771cc07a7c1ade7b52a0ab7d053df
-
SSDEEP
3072:oCKCpJst2sCckRVDHOiHXJhLfCKCpJs+2sE/LkRVDHOiHXJELq2ZU:A2sCDLu2sE/jLq2ZU
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
06aba4c02220a41d53198ecd3b319a5032f6bfab9f170d92f476c22f3f14a220.doc windows office2003
ThisDocument
Customize_Implementation_Plan
Customization
ThisDocument
Customize_Implementation_Plan
Customization