Behavioral task
behavioral1
Sample
7cbb26ae021905852e891c6320cf962d5ce1587c7a19085d55e50b4d6c79941d.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7cbb26ae021905852e891c6320cf962d5ce1587c7a19085d55e50b4d6c79941d.doc
Resource
win10v2004-20231215-en
General
-
Target
7cbb26ae021905852e891c6320cf962d5ce1587c7a19085d55e50b4d6c79941d
-
Size
204KB
-
MD5
0a286239b3fe2e44545470e4117f66eb
-
SHA1
03ec9a08e518c164dd41e80d8aef4bc839eb42b6
-
SHA256
7cbb26ae021905852e891c6320cf962d5ce1587c7a19085d55e50b4d6c79941d
-
SHA512
365f000f3c5cac7995ee9e4c85d9f9345673d063513fe3fe036519dabe6ad7eeae819384bcdfac255a5049a525fa65fa6094db1a1fdb1e1e45e710ee27432922
-
SSDEEP
3072:S3FQyTBPvSIK0S4iiIo0sRN4yJx/MGz3AfEdNPhBQvRFCtdPdiERBeS:S3FQ8BPvOzwBRNJ/HTAfEdNz
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
7cbb26ae021905852e891c6320cf962d5ce1587c7a19085d55e50b4d6c79941d.doc windows office2003