Behavioral task
behavioral1
Sample
0e2c2eae6ef31b0a74f66592313c3308865b16bdee91e1e276e63eab68a581ab.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0e2c2eae6ef31b0a74f66592313c3308865b16bdee91e1e276e63eab68a581ab.doc
Resource
win10v2004-20240709-en
General
-
Target
0e2c2eae6ef31b0a74f66592313c3308865b16bdee91e1e276e63eab68a581ab
-
Size
11.8MB
-
MD5
e00d03e7f07f623d26aab4289904d956
-
SHA1
304dec0dddf94fa746bfeebf7c275d47585fde7d
-
SHA256
0e2c2eae6ef31b0a74f66592313c3308865b16bdee91e1e276e63eab68a581ab
-
SHA512
65af9d0152e677c632be452d48257a89a5c2e1162b830df3a184696b67af247e7873162c56584482c5453a133d0ce26d037e710141c59e3633b345b9d66862c6
-
SSDEEP
196608:FIsUCBmqEyHvtDGKAhGRTbMMKP1bMEc8+QKJLDVZU2/bPE6SV6sXIkLUn:FIhOmDyH1DGxERTYRP1Y1QKL+uLINh6
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
0e2c2eae6ef31b0a74f66592313c3308865b16bdee91e1e276e63eab68a581ab.doc windows office2003