Behavioral task
behavioral1
Sample
ef2c094d1c02537e70186f840590de2310e17828ab32d3f6936b5099b9a6b9e8.doc
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef2c094d1c02537e70186f840590de2310e17828ab32d3f6936b5099b9a6b9e8.doc
Resource
win10v2004-20240802-en
General
-
Target
ef2c094d1c02537e70186f840590de2310e17828ab32d3f6936b5099b9a6b9e8
-
Size
44KB
-
MD5
3e21bd8f21c5c82f42bced3d362abb84
-
SHA1
d7525855cc6116803d4fbd646d7faf89dd28d12a
-
SHA256
ef2c094d1c02537e70186f840590de2310e17828ab32d3f6936b5099b9a6b9e8
-
SHA512
b905056b31cc710ac03631dd4c72abd6ee5a79dd73957b7e41e4c8367fb6c1459c0e69416b1e59bcef5e4ced8d7481ee0fea0202901ccd971bec63ea0aad8d2b
-
SSDEEP
768:vKKvKKKKBKKrKrqqlKzYY7vKKKKKKSKKK3KKKsKKKKKqKKCbLTJpq+peaqnlhnZa:WLdpq+peaglhZ9JcWTWt
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
ef2c094d1c02537e70186f840590de2310e17828ab32d3f6936b5099b9a6b9e8.doc windows office2003