Behavioral task
behavioral1
Sample
c14a8498f9b8b4a1ed8d5f27e2aae22b9359e033d92af631e49f17a8a5be66c8.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c14a8498f9b8b4a1ed8d5f27e2aae22b9359e033d92af631e49f17a8a5be66c8.doc
Resource
win10v2004-20240226-en
General
-
Target
c14a8498f9b8b4a1ed8d5f27e2aae22b9359e033d92af631e49f17a8a5be66c8
-
Size
1.6MB
-
MD5
2c2577d7862f670e97a15bbea540c9fc
-
SHA1
07122af5842c5c7d154eab8cb03d2632697ed256
-
SHA256
c14a8498f9b8b4a1ed8d5f27e2aae22b9359e033d92af631e49f17a8a5be66c8
-
SHA512
8e101e0e0440f5e39c831eb8ff767a8c72ccf27b9dfaeb2783da98ea2d79f3624f10bff6845f051a55ebd6f78c1894d9d0aba7d419a28d70adb264c2e14293f0
-
SSDEEP
24576:z7Irtv919uxpEQcA+S96NZngN6L1FS1LqFLOJLzVAA1tc1Zu1SL1691gU1eU1hF:zkrF9u/EQcY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
c14a8498f9b8b4a1ed8d5f27e2aae22b9359e033d92af631e49f17a8a5be66c8.doc windows office2003