Behavioral task
behavioral1
Sample
d938e01009765544934875688c6cc197789682dcdefee2039cd0b10cccba45ee.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d938e01009765544934875688c6cc197789682dcdefee2039cd0b10cccba45ee.doc
Resource
win10v2004-20240226-en
General
-
Target
d938e01009765544934875688c6cc197789682dcdefee2039cd0b10cccba45ee
-
Size
58KB
-
MD5
20997f70bbe2577ae4001a314f1e208a
-
SHA1
4de3118370c2720d60df566684b8b3b7ebf6dfa2
-
SHA256
d938e01009765544934875688c6cc197789682dcdefee2039cd0b10cccba45ee
-
SHA512
34f339ac4a6cf0a98834fc5339fbec76e2755baf074433d5c023b22e5f7452c511e418e71dbe8bc61e95eeee81f7538fe0dd530e5264d0705efde09f71d08f4e
-
SSDEEP
768:ryIKKsl9iF7gWMsdMVkm1cdq8gX3Dsxz99oinZ:u0sl9iF7gWMsdlm1cdqlHDs3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
d938e01009765544934875688c6cc197789682dcdefee2039cd0b10cccba45ee.doc windows office2003
ThisDocument