Behavioral task
behavioral1
Sample
9de02635d9732b0accc3db5ed014b06bcf72cb0b6ebc673bdc94fac780c7905a.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9de02635d9732b0accc3db5ed014b06bcf72cb0b6ebc673bdc94fac780c7905a.doc
Resource
win10v2004-20240226-en
General
-
Target
9de02635d9732b0accc3db5ed014b06bcf72cb0b6ebc673bdc94fac780c7905a
-
Size
41KB
-
MD5
d3cce1b299b0c83f8524c758da9b832f
-
SHA1
2867f9e55f3fba08121f3198a93586f4e5f26a32
-
SHA256
9de02635d9732b0accc3db5ed014b06bcf72cb0b6ebc673bdc94fac780c7905a
-
SHA512
ae57eb510f0131aa4b149f447c54fbbbed10a77475fe29bc30437fb5324e31a73f69c5057aa0787e3ee55ad530aff671e9f1313b91174f68fbbf89132666d6ce
-
SSDEEP
384:u9tIiSJPw+QD1+HopYzJqF250j7v1Lli83rCGZPtTFeFaxZP:o+kkINEKvNllvZlFeFaxZP
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9de02635d9732b0accc3db5ed014b06bcf72cb0b6ebc673bdc94fac780c7905a.doc windows office2003
ThisDocument
NewMacros