Behavioral task
behavioral1
Sample
e63f0f98c89a30f2ee727ba3df6c583eb03209dae1248540e51c7caa75df3ae6.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e63f0f98c89a30f2ee727ba3df6c583eb03209dae1248540e51c7caa75df3ae6.doc
Resource
win10v2004-20240426-en
General
-
Target
e63f0f98c89a30f2ee727ba3df6c583eb03209dae1248540e51c7caa75df3ae6.doc
-
Size
111KB
-
MD5
694dc395d76047b7e1661f8e1100784e
-
SHA1
295fd18eea728769d25fff34b1ae884510e58406
-
SHA256
e63f0f98c89a30f2ee727ba3df6c583eb03209dae1248540e51c7caa75df3ae6
-
SHA512
e3be6ac935d261f3c243b487058245ccedc5622a70116c6570de3c623456742e88e085531391c538f2ab2c1df55f5fe8021adcb95c3572adaa2ecccbd4ebabf9
-
SSDEEP
1536:GNcCRqVUWXqzPDnPD4q5PD4RVyD837QCSeyz0vSjQxmQu5qSCKEk3yY:hTjRVJajamQu5qSeY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
e63f0f98c89a30f2ee727ba3df6c583eb03209dae1248540e51c7caa75df3ae6.doc.doc windows office2003