Behavioral task
behavioral1
Sample
0e95aa697888a23b8f0646bbc292676cbcd44acaaece97a175f6831c388d6e68.doc
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0e95aa697888a23b8f0646bbc292676cbcd44acaaece97a175f6831c388d6e68.doc
Resource
win10v2004-20240709-en
General
-
Target
0e95aa697888a23b8f0646bbc292676cbcd44acaaece97a175f6831c388d6e68
-
Size
54KB
-
MD5
d993d1f9c29de160f8ad355d155182ad
-
SHA1
eef83575215c992299298735a785d056296d69e6
-
SHA256
0e95aa697888a23b8f0646bbc292676cbcd44acaaece97a175f6831c388d6e68
-
SHA512
2b3908ff9f71869d519a1dbe0ef791fa339fb590a285dcb9178d6b19f94ce8d38bb05115670c0d458fe5330632808808262eb023c5cab7d1d22cdf37d0869655
-
SSDEEP
768:h53Vzhf+As8UJq5aTwWud/4glP4ypL3y9hnkHaJNgxB9jY/O/sy0Mds7p9:rDfWrJRZuPlP4ypzyLkHaJUjr/GMdS9
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0e95aa697888a23b8f0646bbc292676cbcd44acaaece97a175f6831c388d6e68.doc windows office2003
ThisDocument