Behavioral task
behavioral1
Sample
1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5.doc
Resource
win10v2004-20240426-en
General
-
Target
1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5
-
Size
38KB
-
MD5
e353fed1111bf8f52bcfdf1bf3400952
-
SHA1
39878ea251e2e4ab33a8f94f36a664940d7debd4
-
SHA256
1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5
-
SHA512
e295a6f2339bc6eb79ee7645bed658669df5440b68805bbe2cffd6333b16ffa5890b1b6c463fd269fb70fb8194f9c9163a4a672d18f92f666debf81c98a5b6f6
-
SSDEEP
384:W2IiSgq03gBapIkZ+Rmg+40oqI8CkxQaH50jTcw8Uxt:/G03gmZs0oqI8PxQaZjI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
1eeb63beb49968b32d0b451613059ef29957b922cf7c5cd170c4257eed7ff5a5.doc windows office2003