Behavioral task
behavioral1
Sample
ce3681ec2e62af9f0231b1a32a7319766d8193d0ff86c69691176f4cd404f129.doc
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ce3681ec2e62af9f0231b1a32a7319766d8193d0ff86c69691176f4cd404f129.doc
Resource
win10v2004-20241007-en
General
-
Target
ce3681ec2e62af9f0231b1a32a7319766d8193d0ff86c69691176f4cd404f129.doc
-
Size
143KB
-
MD5
059f7753a76e86c8ed56f480041d631f
-
SHA1
c356187bee23b8930e82ba2cea112873b39567d4
-
SHA256
ce3681ec2e62af9f0231b1a32a7319766d8193d0ff86c69691176f4cd404f129
-
SHA512
94ce1aff40a57a963dabec69fbc969dbc27ff7289ca07a21233379a415cca52fbc69cbab722afef149077ab3647798192332b6afd5500d3189206728dc22f81b
-
SSDEEP
1536:17dgmjjy2lQkySTUb2roegTK+g9WomfaQjSqttJnkL5mS9kBwNR42q3V:1ZPjbTU+J799IjSqtteL5N9kBF2
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
ce3681ec2e62af9f0231b1a32a7319766d8193d0ff86c69691176f4cd404f129.doc.doc windows office2003
ThisDocument