Behavioral task
behavioral1
Sample
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628.doc
Resource
win10v2004-20240802-en
General
-
Target
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628
-
Size
76KB
-
MD5
6749d033acc7831369838214f516d30e
-
SHA1
62629c3c670e996474f75fdbc4ac67c756ba19a2
-
SHA256
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628
-
SHA512
f5bb4b402758df9bd156c8b94d93abfadd4291105812ac2282ca8af8e99686b6bb398ef3867e2ef2f6ba75977f71b7f891eb398e9a46fb1ca970c29ad8ec2de9
-
SSDEEP
768:Iixw+tHKI43TqiVZHyrJ+pXrRDBjg/wekD/r6:fxrtqkrJ+pXdq/wRO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
6cca05a67555dffeb4069f1b57ef2c3ca9f01b3bba6c8f69c4fd2c26256b0628.doc windows office2003
ThisDocument