Behavioral task
behavioral1
Sample
217709cbc11d5f7f73bd23de4ffad455710001519a0f0f2f6d8e6f3f5f79cfed.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
217709cbc11d5f7f73bd23de4ffad455710001519a0f0f2f6d8e6f3f5f79cfed.doc
Resource
win10v2004-20240226-en
General
-
Target
217709cbc11d5f7f73bd23de4ffad455710001519a0f0f2f6d8e6f3f5f79cfed
-
Size
664KB
-
MD5
11a5c681e108cf84a2cc669e8204ac53
-
SHA1
0d8e69ff1db79962121a1f3064c2ef6322fd18b1
-
SHA256
217709cbc11d5f7f73bd23de4ffad455710001519a0f0f2f6d8e6f3f5f79cfed
-
SHA512
ac7dec22f98b55926b1783572d1a00d01ec287e98b7b57baa937c4ec98db1bf290fc0674a39928aa647909830072fdfa9b842eb5b97c7578123d951cbd9da366
-
SSDEEP
12288:dAAEMCBBCH/2wZ4AEMCBBCH/2wsMkJcV:2RrX+2Q4RrX+2RMk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
217709cbc11d5f7f73bd23de4ffad455710001519a0f0f2f6d8e6f3f5f79cfed.doc windows office2003