Behavioral task
behavioral1
Sample
9c2f7bb30eb05751df200341415f55d435e3aae3c575ff947909f4e492eea8c8.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9c2f7bb30eb05751df200341415f55d435e3aae3c575ff947909f4e492eea8c8.doc
Resource
win10v2004-20240226-en
General
-
Target
9c2f7bb30eb05751df200341415f55d435e3aae3c575ff947909f4e492eea8c8
-
Size
4.6MB
-
MD5
dc9a08f4d7e20b7cbbbac38ddeb4f33e
-
SHA1
c0ac44adf4b8a97aa0ae553fc771fcdc3a538704
-
SHA256
9c2f7bb30eb05751df200341415f55d435e3aae3c575ff947909f4e492eea8c8
-
SHA512
e0800f01e17fd37971ac7beeeeff7bb377f38eedbd652c34019191182a3fa9321c0ade037f9dbeb8d118e7a07759fc4da3f8d305742757bf970fa68755b5a8fe
-
SSDEEP
49152:LUWSniovPydS07+qavw/J+P37W++nbb4ItYKR:LCniovPydS07+q4w87WrtYu
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
9c2f7bb30eb05751df200341415f55d435e3aae3c575ff947909f4e492eea8c8.doc windows office2003