Behavioral task
behavioral1
Sample
8a304b04b8c480ab83508f0599edcb3b3970cc16df34c513b16c8781ebd3bd19.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8a304b04b8c480ab83508f0599edcb3b3970cc16df34c513b16c8781ebd3bd19.doc
Resource
win10v2004-20240412-en
General
-
Target
8a304b04b8c480ab83508f0599edcb3b3970cc16df34c513b16c8781ebd3bd19
-
Size
32KB
-
MD5
0d0c88337fda0ca2a004c7d7696079f0
-
SHA1
a94260ea968432aa9a30f94de14f76f2f18fa8cd
-
SHA256
8a304b04b8c480ab83508f0599edcb3b3970cc16df34c513b16c8781ebd3bd19
-
SHA512
ba9de2ce345f8aa495a1a937bbba6c164c1c12fae88e61a00ee8848526d62f2066bc18a59f34c07161c4db5a40c630c31b873fc6f319dbdb241827bc86273a26
-
SSDEEP
192:IIlLZEvA+6/6rNavrgYjk+4bWlW3INtb8t5CNw0y1sg0jZ/kfxaElrmXru:IE8iSwvxjk+tWOtwtAaf1sg0jMZrqru
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
8a304b04b8c480ab83508f0599edcb3b3970cc16df34c513b16c8781ebd3bd19.doc windows office2003