Behavioral task
behavioral1
Sample
17e3eeebccc4e252663a2e4725d798d8f9b6eaea067891b323b943848648133f.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
17e3eeebccc4e252663a2e4725d798d8f9b6eaea067891b323b943848648133f.doc
Resource
win10v2004-20240226-en
General
-
Target
17e3eeebccc4e252663a2e4725d798d8f9b6eaea067891b323b943848648133f
-
Size
1.3MB
-
MD5
0511d615e956934facb5522b8d96b70c
-
SHA1
f3cfba7ecce6ab7b9bdba0557da47fc914562bac
-
SHA256
17e3eeebccc4e252663a2e4725d798d8f9b6eaea067891b323b943848648133f
-
SHA512
44bd0e5908c917cfe393ea9715b06a521bf18a3cbc91ff26ca8fd6cdf151b74ba6560eb64dc4cfa58948705fc30a60a31330875ca572bcfd49ef66a64c3bf2af
-
SSDEEP
24576:OxGyIE7Lo/M7T+Yqe8S+IAZc4VmWhpGfm3dF:Okyz7LoUPtJB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
17e3eeebccc4e252663a2e4725d798d8f9b6eaea067891b323b943848648133f.doc windows office2003