Behavioral task
behavioral1
Sample
8ce9d24b24031c623cb0adcd20339942a2de41acb34a1b56dca30a52c6d0ab56.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ce9d24b24031c623cb0adcd20339942a2de41acb34a1b56dca30a52c6d0ab56.doc
Resource
win10v2004-20240802-en
General
-
Target
8ce9d24b24031c623cb0adcd20339942a2de41acb34a1b56dca30a52c6d0ab56
-
Size
38KB
-
MD5
28d586ef87ae232aedd29e65f1543b68
-
SHA1
bd36acf3ba5531482942e4a1de9330a2b91b1726
-
SHA256
8ce9d24b24031c623cb0adcd20339942a2de41acb34a1b56dca30a52c6d0ab56
-
SHA512
7628aeec66cc824c349a58e9315e871c416be839a708631eee71f00ac516258ce614f3ad050fe121d85fc34fd207dd5f73f1e7e4575d6e1d4b230b2564a52cfe
-
SSDEEP
384:vnE8iSwvxjk+t4X5+RxtEoMGocVD5BHxIN150j4fNWT:vnqxw+tQuMGocN5luI
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
8ce9d24b24031c623cb0adcd20339942a2de41acb34a1b56dca30a52c6d0ab56.doc windows office2003
ThisDocument
ezdqgqjsu
kibrcdfsp
vmuxdawfs
xdtjfklgo