Behavioral task
behavioral1
Sample
cde21036536aca66aded7d4f9ff38dc7417c5a1c447f2a228f701044c21735a2.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cde21036536aca66aded7d4f9ff38dc7417c5a1c447f2a228f701044c21735a2.doc
Resource
win10v2004-20240226-en
General
-
Target
cde21036536aca66aded7d4f9ff38dc7417c5a1c447f2a228f701044c21735a2
-
Size
905KB
-
MD5
885046815ef181c62d0a0cab6d86684a
-
SHA1
1dec50dbcb623021c811a486119318e145aec8aa
-
SHA256
cde21036536aca66aded7d4f9ff38dc7417c5a1c447f2a228f701044c21735a2
-
SHA512
db56312b1d2efd79f60043cd7e8487e85b8e9fb12d80b37cdb09063f05538eaee8adfe39b025bbbc37f7d92ca2b4a35dd41474ad152b2d22800b9637efca00b8
-
SSDEEP
12288:NGrDYemcXpTsFdmHEcnzvAHOmBab+JQ4Jh9XQCwk:JQXpwmHxmlmUh9gCwk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cde21036536aca66aded7d4f9ff38dc7417c5a1c447f2a228f701044c21735a2.doc windows office2003
ThisWorkbook
Sheet1
Sheet2
Sheet3
JKToolKitGasDispersionModule
JKToolKitLagranModule
JKToolKitRegressionLinesModule
JKToolKitM210ModelModule
RecVarModule
CMineralToAssay
frmAbout
JKToolKitGYSizeModule
SizeDistributionModule
JKToolKitModule
JKToolKitPulpDensityModule
JKToolKitRequiredBMPowerModule
JKToolKitSuperBootStrapModule
JKToolKitRodMillBondWorkModule
JKToolKitRodMillPowerCalcModule
JKToolKitMineralToAssayModule
JKToolKitUnitConversionModule
frmFeedback
RandomValues
JKToolKitMillChargeAndSpeed
Usefull
Statistics
JKToolKitMorrellPowerModule
JKToolKitBootstrapGradeModule
MassVarModule
JKToolKitBMPowerDrawModule
JKToolKitResidenceTimeModule
JKToolKitConversionTableModule
JKToolKitFrothRecoveryModule
JKToolKitGYErrorModule
JKToolKitMorrelPowerToolModule