Behavioral task
behavioral1
Sample
c765c2c303b85fb7588f33e1db09d10588c71faf86f4fb10a8da01324d68f574.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c765c2c303b85fb7588f33e1db09d10588c71faf86f4fb10a8da01324d68f574.doc
Resource
win10v2004-20231215-en
General
-
Target
c765c2c303b85fb7588f33e1db09d10588c71faf86f4fb10a8da01324d68f574
-
Size
58KB
-
MD5
065550b395980c905c3c4191ec6ba1bb
-
SHA1
9e96114159d458597ed2fdc8603a97c9cd2c1e90
-
SHA256
c765c2c303b85fb7588f33e1db09d10588c71faf86f4fb10a8da01324d68f574
-
SHA512
42234b81367f20e5705803be1d132709b6b53733e214a408f339765907581d4e530c24ad156670c8e92cf7c97ebd6b04ae5f152ab1bd2cce83111b2ec54a6129
-
SSDEEP
768:NAKqsYA9iF7gWMsdMVkz1cdqs1N/Dmxz99oinZ:NMsYA9iF7gWMsdlz1cdq8JDm3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c765c2c303b85fb7588f33e1db09d10588c71faf86f4fb10a8da01324d68f574.doc windows office2003
ThisDocument