Behavioral task
behavioral1
Sample
1c2466b4c508be9ede2bd122b1d33dce232e51d986162bf14d95c84290e4c658.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c2466b4c508be9ede2bd122b1d33dce232e51d986162bf14d95c84290e4c658.doc
Resource
win10v2004-20240226-en
General
-
Target
1c2466b4c508be9ede2bd122b1d33dce232e51d986162bf14d95c84290e4c658
-
Size
651KB
-
MD5
e8a064678e7d18bc6c54566ec0b53b7b
-
SHA1
03d35a15483c8fe88a6c7ff2bd8fd014803dd786
-
SHA256
1c2466b4c508be9ede2bd122b1d33dce232e51d986162bf14d95c84290e4c658
-
SHA512
a71797122a7745e678d0c040254e32f850d09909b3a93e9de30cd485d17381fc4337fe39eb86eb80f4e0271636190faf92448d5edf853d82e0d9f283796430e0
-
SSDEEP
12288:MQBVYDYWM7Vbsvm5AvCxj8Qubci9fH2A+rEC1:sDZ2svm5AvCxj8Qubci9fH2A+rL1
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1c2466b4c508be9ede2bd122b1d33dce232e51d986162bf14d95c84290e4c658.doc windows office2003