Behavioral task
behavioral1
Sample
dfc8620305be7956d6e3e8b688a4760d965e989cc8b3255843bf7f18faf3b01c.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
dfc8620305be7956d6e3e8b688a4760d965e989cc8b3255843bf7f18faf3b01c.doc
Resource
win10v2004-20240226-en
General
-
Target
dfc8620305be7956d6e3e8b688a4760d965e989cc8b3255843bf7f18faf3b01c
-
Size
27KB
-
MD5
eee26c7a48a8189df72e8f66f0b271a7
-
SHA1
e4c0bf510d1706520ac1251783be9b62d26b0bee
-
SHA256
dfc8620305be7956d6e3e8b688a4760d965e989cc8b3255843bf7f18faf3b01c
-
SHA512
f641afe9905527989d0f65a4e0ff06d531837577355da67b62d5bfdebad9357801da0321ca7d6553f636c1b862d49f4a67ca6300c28d83471ca6fc37c09569b1
-
SSDEEP
384:xq1YQZSpON0jpWotL5wZiAyjokvJiFdEJyohTIB:xQX2MkvJiPEcohkB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
dfc8620305be7956d6e3e8b688a4760d965e989cc8b3255843bf7f18faf3b01c.doc windows office2003
ThisDocument
Modul1