Behavioral task
behavioral1
Sample
b08421aef5e35621a604b4ea0eb4b1a1c94a6aed6623122cbf8ca971a45210ec.unknown
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b08421aef5e35621a604b4ea0eb4b1a1c94a6aed6623122cbf8ca971a45210ec.unknown
Resource
win10v2004-20240802-en
General
-
Target
b08421aef5e35621a604b4ea0eb4b1a1c94a6aed6623122cbf8ca971a45210ec.unknown
-
Size
24KB
-
MD5
5eff98cae865a778f41eb58fc9bcae58
-
SHA1
6267a0105e8a1ae8f0801f0635abd7efc07249ed
-
SHA256
b08421aef5e35621a604b4ea0eb4b1a1c94a6aed6623122cbf8ca971a45210ec
-
SHA512
9d23e1bf4071ad52a5be71de127a27bc6ff8b8b790543295abc6374e435e1a8e703f3ed60365988fed85d914a126552dd2e6e8feb89bf49338cb5748c385d729
-
SSDEEP
192:r8oK3rcd5kM7ffi4UMF1pkOvpF3EiRcx+NSzfxmrmE76tNY2pCumJ0pQrXVjavmk:gGekfnVxVNOmrmEu3YcrmSpC1k
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b08421aef5e35621a604b4ea0eb4b1a1c94a6aed6623122cbf8ca971a45210ec.unknown.unknown .doc windows office2003