Behavioral task
behavioral1
Sample
cb0e8125b4979ffb5dda0aa31c6d0764da45e6997e865cd75206a9d78a1db5f8.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb0e8125b4979ffb5dda0aa31c6d0764da45e6997e865cd75206a9d78a1db5f8.doc
Resource
win10v2004-20240226-en
General
-
Target
cb0e8125b4979ffb5dda0aa31c6d0764da45e6997e865cd75206a9d78a1db5f8
-
Size
1.4MB
-
MD5
76a8391c77723b06587f648dcbde07e9
-
SHA1
6547818cca70323a2805678ee91bc0b55a4000a1
-
SHA256
cb0e8125b4979ffb5dda0aa31c6d0764da45e6997e865cd75206a9d78a1db5f8
-
SHA512
cf1cdf41cb63a0a8c34f178bc091172dbed408c4917cf386b4e4f0e148ff280155596c1bc007ae6afcf8820333a52607b0437a001014824b44ef99efbb17b1cf
-
SSDEEP
12288:/mXSqMYCxWA4k8B/m9MMw+hZzsrSKL/bwG:uEYiWAL8B/S3NsrD/8G
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
cb0e8125b4979ffb5dda0aa31c6d0764da45e6997e865cd75206a9d78a1db5f8.doc windows office2003
ThisDocument