Behavioral task
behavioral1
Sample
65ed7010a294b72c9418dd0514f99f17fa57ceb87bf4f7622cf27c2a7ba76661.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
65ed7010a294b72c9418dd0514f99f17fa57ceb87bf4f7622cf27c2a7ba76661.doc
Resource
win10v2004-20240226-en
General
-
Target
65ed7010a294b72c9418dd0514f99f17fa57ceb87bf4f7622cf27c2a7ba76661
-
Size
677KB
-
MD5
a92c6617aa28d4041c44f4b9cc3a5fa3
-
SHA1
3836bcca65c8168481f745872534d483ed533c20
-
SHA256
65ed7010a294b72c9418dd0514f99f17fa57ceb87bf4f7622cf27c2a7ba76661
-
SHA512
fce75ddc7c772ba21166afdb80319053c5e2148a3937d6631077f3d0b328e4112128b662cb28cb5f4aed34bcb29fb162230644e24e9374c728d70ea046975159
-
SSDEEP
12288:2bAEMCBBCH/2wZOAEMCBBCH/2wscsQAc:kRrX+2QORrX+2Rcs
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
65ed7010a294b72c9418dd0514f99f17fa57ceb87bf4f7622cf27c2a7ba76661.doc windows office2003