Behavioral task
behavioral1
Sample
1209fc2215bc145360faf3efaad4cd8534f5dfda0c3cdafae74f5cfa43cf77e3.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1209fc2215bc145360faf3efaad4cd8534f5dfda0c3cdafae74f5cfa43cf77e3.doc
Resource
win10v2004-20240508-en
General
-
Target
1209fc2215bc145360faf3efaad4cd8534f5dfda0c3cdafae74f5cfa43cf77e3
-
Size
298KB
-
MD5
d6efbccdad6821c3df9b680070eca067
-
SHA1
b5a35b9e50b693ce2fda475510f61001b5551cb9
-
SHA256
1209fc2215bc145360faf3efaad4cd8534f5dfda0c3cdafae74f5cfa43cf77e3
-
SHA512
a95c106a8ccf6844641dfc0e5924d5827c4191c62b3b57a2271051b33a1f7a4ffefdf58c9f2bbc97b6bc0a07144110ccbdf688b8210d726be39de1aa110d5af6
-
SSDEEP
6144:16B/XtVq3OmS24joOVLxJ37U0kPLmFBPhkNCNTQ2fap/SyXguO79LqD5xbsI2wHT:16rJ3wRk
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
1209fc2215bc145360faf3efaad4cd8534f5dfda0c3cdafae74f5cfa43cf77e3.doc windows office2003
ThisDocument