Behavioral task
behavioral1
Sample
08a1a64b9567a18134ad8f24511ae8c839eb3a427c6c7af2950b49351b38a077.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
08a1a64b9567a18134ad8f24511ae8c839eb3a427c6c7af2950b49351b38a077.doc
Resource
win10v2004-20240709-en
General
-
Target
08a1a64b9567a18134ad8f24511ae8c839eb3a427c6c7af2950b49351b38a077
-
Size
987KB
-
MD5
c91ff13bfdc755d7a3d6fd2120d9f137
-
SHA1
c19942867595449726d918257f3be18f3c226234
-
SHA256
08a1a64b9567a18134ad8f24511ae8c839eb3a427c6c7af2950b49351b38a077
-
SHA512
83ae9521e9a429e2ab6584646fd8828bf84a7d0cfecc8b12c87f64610a7be0d5fa417a5b40e7483fb81bbdc758ad11c5fb06909290dd1b675e21a85e97585907
-
SSDEEP
12288:1BGIYW4wA74FRrUSJUnKERsY10hYBzSF6G8MHZf5th8NS+LBYl9o/OCd2yVlQSvj:1EIZ4wA74D4SQKxZcy8gthDWIsOJERx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
08a1a64b9567a18134ad8f24511ae8c839eb3a427c6c7af2950b49351b38a077.doc windows office2003
ThisDocument
Module1
Module2
Module3