Behavioral task
behavioral1
Sample
1cdcc348e46f10f882d1f42b2f43d1045ee0d2947a48239c3eccbdfe8c4b7502.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1cdcc348e46f10f882d1f42b2f43d1045ee0d2947a48239c3eccbdfe8c4b7502.doc
Resource
win10v2004-20240226-en
General
-
Target
1cdcc348e46f10f882d1f42b2f43d1045ee0d2947a48239c3eccbdfe8c4b7502
-
Size
229KB
-
MD5
88bba0077207359cdb9bddb3760f1f32
-
SHA1
f7a359a109400490520e59757377042887437aab
-
SHA256
1cdcc348e46f10f882d1f42b2f43d1045ee0d2947a48239c3eccbdfe8c4b7502
-
SHA512
a2de406f6b3496d39f6aebce71caaebf335fefd6cb53ef0bb50d777657c10b029279124451e8c8152ab0d05341697f4af5a0fc00658b0d2bbd3f85fc967bdae2
-
SSDEEP
3072:N3FQyTBPvSIK0S4iiIo0sRN4yJx/MGz3AfEdNfhJDJw4TPSRM8R2n/vn:N3FQ8BPvOzwBRNJ/HTAfEdN3H6WH3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1cdcc348e46f10f882d1f42b2f43d1045ee0d2947a48239c3eccbdfe8c4b7502.doc windows office2003