Behavioral task
behavioral1
Sample
8769ca95d6fae8278b8e97081f0735fcf0ea827837714c47e8aaf3efeb755cea.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8769ca95d6fae8278b8e97081f0735fcf0ea827837714c47e8aaf3efeb755cea.doc
Resource
win10v2004-20240226-en
General
-
Target
8769ca95d6fae8278b8e97081f0735fcf0ea827837714c47e8aaf3efeb755cea
-
Size
87KB
-
MD5
9360fa66beb97c77b1e1206f5b544d62
-
SHA1
876fae9d913c2ce78e1576d3f9e87458c8d901af
-
SHA256
8769ca95d6fae8278b8e97081f0735fcf0ea827837714c47e8aaf3efeb755cea
-
SHA512
76ea28b262bb925548f1d87545c8ec03d86162c51c7a0234723d37f40963451985a6c163ad5d6871d0ea880c18fa620e722654efed2fec1f9aa2bcfd64c7c394
-
SSDEEP
768:5wRD9YgOuXC5CipsLteqzVZpNOsMT0U7414r1FOdXMjuLyRm76lWdT3ZSFy:5wcFsLe214DO4uLyeT3ZSFy
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8769ca95d6fae8278b8e97081f0735fcf0ea827837714c47e8aaf3efeb755cea.doc windows office2003
ThisDocument
qMxZpnTGwTFX
ezUSYqKhZYPi
YEwEZWmYSoMB