Behavioral task
behavioral1
Sample
b600e87a1b69647ac4f753b8123bdc2622aaaa88d3cfebdcf9a60c8ed474dde9.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b600e87a1b69647ac4f753b8123bdc2622aaaa88d3cfebdcf9a60c8ed474dde9.doc
Resource
win10v2004-20240226-en
General
-
Target
b600e87a1b69647ac4f753b8123bdc2622aaaa88d3cfebdcf9a60c8ed474dde9
-
Size
601KB
-
MD5
2230d74cdf5cdf80cf325c9b86d98305
-
SHA1
3a0fe0a3ebf2e8af24c9a70d0e9449e62a6e2060
-
SHA256
b600e87a1b69647ac4f753b8123bdc2622aaaa88d3cfebdcf9a60c8ed474dde9
-
SHA512
33f388c354dacfd9d4fa5475aed93bf213542a5de1200831e6a351cbeb90b5066012361d7385b15c6f1757639f6c879d7fe4cc41793edde1d0b41f2a5ebeb2ca
-
SSDEEP
12288:2j+B99Fh0WlxZlxo0KcF6hZk+oLJGdDXjtFE/xfOC+GmoZqeOl:2CBL/XlxC0TF6hZk+oLJGdDXjtFE/xfE
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
b600e87a1b69647ac4f753b8123bdc2622aaaa88d3cfebdcf9a60c8ed474dde9.doc windows office2003
ThisWorkbook
Sheet1
SeSh1
Class1
Class2
sekisan1
sekisan2
sekisan3
sekisan4
UserForm1
UserForm2
UserForm3
UserForm4
UserForm5
UserForm6