Behavioral task
behavioral1
Sample
8db0e084f1e6b6d6f9036c15fbcbf9e4a646cbb9503351c7c00df22696ebbd2a.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8db0e084f1e6b6d6f9036c15fbcbf9e4a646cbb9503351c7c00df22696ebbd2a.doc
Resource
win10v2004-20240426-en
General
-
Target
8db0e084f1e6b6d6f9036c15fbcbf9e4a646cbb9503351c7c00df22696ebbd2a
-
Size
32KB
-
MD5
2d56b2cef141b4d7fdcec23b17ddb233
-
SHA1
d06132733c5a9205eb1d315422566c5253195264
-
SHA256
8db0e084f1e6b6d6f9036c15fbcbf9e4a646cbb9503351c7c00df22696ebbd2a
-
SHA512
c4f679f6570c6512d4adbe6c67af577ccba13adb7165bfeb898ff40af12735e287acffbaef5e47e4935c15424cb7b74580930c777bd5ca390b38f950b57d1e6a
-
SSDEEP
384:cllDziSJPw+QD12g+I86GCdv50jUstY6:YlM+kXbv
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
8db0e084f1e6b6d6f9036c15fbcbf9e4a646cbb9503351c7c00df22696ebbd2a.doc windows office2003
ThisDocument
Module1