Behavioral task
behavioral1
Sample
ccf57b26f850e951f8963de1859b347da7c45a2cc3b2873363285002a205677c.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ccf57b26f850e951f8963de1859b347da7c45a2cc3b2873363285002a205677c.doc
Resource
win10v2004-20241007-en
General
-
Target
ccf57b26f850e951f8963de1859b347da7c45a2cc3b2873363285002a205677c
-
Size
35KB
-
MD5
988330297a4f3a8f5e805352395e343f
-
SHA1
af83c9ecc0848e3591d4f4a4ecea270e818ca65e
-
SHA256
ccf57b26f850e951f8963de1859b347da7c45a2cc3b2873363285002a205677c
-
SHA512
b952d12bb4771ff7a6c2e396275d11159a03e3eeb36a211951cfb8d933a4cb2c6129b80246a384d04e529431cf2c615b5ad3188de638864d7a810758d2beca18
-
SSDEEP
384:pSiSwvxjk+tbG3KyVJxfg0jkjH+pz/bT0f8XuJiFtq:pVxw+tgJxohjH+pHTl+4
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ccf57b26f850e951f8963de1859b347da7c45a2cc3b2873363285002a205677c.doc windows office2003
ThisDocument
NewMacros