Behavioral task
behavioral1
Sample
8a868dd80990efbd229d2b19fc16740c6fc2f160fe76b89ce7c1daec757d68f2.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a868dd80990efbd229d2b19fc16740c6fc2f160fe76b89ce7c1daec757d68f2.doc
Resource
win10v2004-20240611-en
General
-
Target
8a868dd80990efbd229d2b19fc16740c6fc2f160fe76b89ce7c1daec757d68f2
-
Size
34KB
-
MD5
5d416350892f798ea0b82bb5eabf32da
-
SHA1
7b1d027ff29205041bf7082fecd4b23906d50eb5
-
SHA256
8a868dd80990efbd229d2b19fc16740c6fc2f160fe76b89ce7c1daec757d68f2
-
SHA512
6b554b73d59b4e1fd74cbe20aa31eba58bb3ff4f4df647ee8f99bbc825adda7c9e0159dac73c410fe4fea000f96b24c13290c57732e7ad541d0064f81e735cda
-
SSDEEP
384:IiSsqdg1vA9J4iFaKx1oY2A0jSNnthfAO:Y+1o9HUKrJ/N0O
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8a868dd80990efbd229d2b19fc16740c6fc2f160fe76b89ce7c1daec757d68f2.doc windows office2003
ThisDocument
NewMacros