Behavioral task
behavioral1
Sample
9cc036b0879d125d24401d0a89743fe5ace701dd6e107ea700f4adddb0238315.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9cc036b0879d125d24401d0a89743fe5ace701dd6e107ea700f4adddb0238315.doc
Resource
win10v2004-20241007-en
General
-
Target
9cc036b0879d125d24401d0a89743fe5ace701dd6e107ea700f4adddb0238315
-
Size
29KB
-
MD5
ac9318d0e8db68d68897f7b226e17386
-
SHA1
96a6eadd0779bfbf47b3a1a3a21c6841faa7279e
-
SHA256
9cc036b0879d125d24401d0a89743fe5ace701dd6e107ea700f4adddb0238315
-
SHA512
c36009ed76e35a43401b2058060d6d4297a74f7ee98ba580cb4be6725c72b4662d043fcfabe073f3e561aa607835a44bfcca2dc5969777ce557fb0e22f2639a9
-
SSDEEP
192:5EO0lLZEvA+6/6r8px8SmvowzxHq30wa6Y6P0tPBxV05JB8aY:a/8iS8px8SMDHgBctK5J
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
9cc036b0879d125d24401d0a89743fe5ace701dd6e107ea700f4adddb0238315.doc windows office2003
ThisDocument
NewMacros