Behavioral task
behavioral1
Sample
65d073da0d265b9b8e4f4284e7850af051908289158877168214cf25e3bc8461.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
65d073da0d265b9b8e4f4284e7850af051908289158877168214cf25e3bc8461.doc
Resource
win10v2004-20240508-en
General
-
Target
65d073da0d265b9b8e4f4284e7850af051908289158877168214cf25e3bc8461
-
Size
43KB
-
MD5
ce9d441c46ef4168488bb38148974c33
-
SHA1
d5b1a13e8be4b770fabcf4278d5adf69b1562a0d
-
SHA256
65d073da0d265b9b8e4f4284e7850af051908289158877168214cf25e3bc8461
-
SHA512
c737b91150d5608bba2abd7c8bb829ec870d4aba249e61b2b213cd51b682558c3de2bd5864f49549dc0b2397264616ae43ff8d638252222d4b45dfb35d4d728b
-
SSDEEP
384:Cg8iSwvxjk+txZEF+pek/iEVd8sfR3rGscsd71I5KA0j4/ItSzY:CGxw+t4F+pekq6d/fhrGsceIZ3/nY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
65d073da0d265b9b8e4f4284e7850af051908289158877168214cf25e3bc8461.doc windows office2003
ThisDocument
Module1