Behavioral task
behavioral1
Sample
c85f29c20111d11791635ad43fa3dfe63580029b6ba67e0610ecd7c7d4e18ff9.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c85f29c20111d11791635ad43fa3dfe63580029b6ba67e0610ecd7c7d4e18ff9.doc
Resource
win10v2004-20240319-en
General
-
Target
c85f29c20111d11791635ad43fa3dfe63580029b6ba67e0610ecd7c7d4e18ff9
-
Size
58KB
-
MD5
df6e0cea9db2e837dd612d3997a6dad2
-
SHA1
71daf7af9480743f9e20254946521d6b648b0fe8
-
SHA256
c85f29c20111d11791635ad43fa3dfe63580029b6ba67e0610ecd7c7d4e18ff9
-
SHA512
9769ffc95f7b9f3531e64f617f3bff0d45064393be94c444739ee20e38c563d0a341f8cd02b3176c50d737134ab3f51056b7e3a1776b3c53ef578d829111ae38
-
SSDEEP
768:7HK63cu+9iF7gWMsdMVkXt1cdqqcsRDrxz99oinZ:7V3cN9iF7gWMsdlXt1cdqLwDr3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c85f29c20111d11791635ad43fa3dfe63580029b6ba67e0610ecd7c7d4e18ff9.doc windows office2003
ThisDocument