Behavioral task
behavioral1
Sample
c69e20245891a3daca8f37a8f2417738087042e85a4e9c80d2f82c84fa546966.doc
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c69e20245891a3daca8f37a8f2417738087042e85a4e9c80d2f82c84fa546966.doc
Resource
win10v2004-20240802-en
General
-
Target
c69e20245891a3daca8f37a8f2417738087042e85a4e9c80d2f82c84fa546966
-
Size
38KB
-
MD5
9d7a7cdd773622a257fc16840f282a54
-
SHA1
de9e2800e514a9cdcf524866f453db56bd4bcdc8
-
SHA256
c69e20245891a3daca8f37a8f2417738087042e85a4e9c80d2f82c84fa546966
-
SHA512
c9f031c755ea1093ae036a85062a138209e9fe484816ce5ac4161e2c05930935bd6be83da206fcdec546fbd73b7227b57f6ed4f295fcb0424393bdc0164e938f
-
SSDEEP
768:fuqzZlFXMx469V8RlFZVjUSgskHGDYZU:mqzZlex469V8RlFZVjUSgskHGDY
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c69e20245891a3daca8f37a8f2417738087042e85a4e9c80d2f82c84fa546966.doc windows office2003
ThisDocument
NewMacros