Behavioral task
behavioral1
Sample
9e06d15265a5d2cc696977a77ded469560f6f1c45a7ce19b8af9181eb97b43b3.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9e06d15265a5d2cc696977a77ded469560f6f1c45a7ce19b8af9181eb97b43b3.doc
Resource
win10v2004-20240508-en
General
-
Target
9e06d15265a5d2cc696977a77ded469560f6f1c45a7ce19b8af9181eb97b43b3
-
Size
107KB
-
MD5
53a82e34a94a0a595c4bc3dc410db6c6
-
SHA1
ef12c6c64c8587e9163a48917b39526e36023c36
-
SHA256
9e06d15265a5d2cc696977a77ded469560f6f1c45a7ce19b8af9181eb97b43b3
-
SHA512
ce1f86548ae68128b17e4e73280a88d26285107016d5ce68f79346bb7fc5a48b11916b4f3aea7e1ca04f91078532cd68b4f00d49788b5c058d004d1a27fbf857
-
SSDEEP
768:KedMGUn7V+2iDaSA0Ivj3yC6vQq0vgSQ5xCYISfU2KbG8a:/EbyC9e92YISfU2Bn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9e06d15265a5d2cc696977a77ded469560f6f1c45a7ce19b8af9181eb97b43b3.doc windows office2003
ThisDocument
NewMacros