Behavioral task
behavioral1
Sample
2c2db036a75072438c2fae06e82d2a3c072a2ca07995179977d64dd4d92d1676.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c2db036a75072438c2fae06e82d2a3c072a2ca07995179977d64dd4d92d1676.doc
Resource
win10v2004-20240226-en
General
-
Target
2c2db036a75072438c2fae06e82d2a3c072a2ca07995179977d64dd4d92d1676
-
Size
1.8MB
-
MD5
62b87fd71fc397bc56a4a68902fb84ff
-
SHA1
1b61db78c1277bb3ea4ebd8795f4483b166320f5
-
SHA256
2c2db036a75072438c2fae06e82d2a3c072a2ca07995179977d64dd4d92d1676
-
SHA512
507cf58830332dec9f4711d5f5eac3d36f2cadb9abca91bd0ce4cebaef0185123997ae209c0f7e64ad6a35be683f432a0b08afd2a87d0439a51500499a310c5f
-
SSDEEP
24576:27gAZvhDHGlVRPVLMTLYujVMxut2owuM+EGpxJ8:yt2aGoK
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
2c2db036a75072438c2fae06e82d2a3c072a2ca07995179977d64dd4d92d1676.doc windows office2003