Behavioral task
behavioral1
Sample
034ec32750334586581cbb6d6d66acd153021fc751d5307ba0cfbbb29800c279.doc
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
034ec32750334586581cbb6d6d66acd153021fc751d5307ba0cfbbb29800c279.doc
Resource
win10v2004-20220812-en
General
-
Target
034ec32750334586581cbb6d6d66acd153021fc751d5307ba0cfbbb29800c279
-
Size
44KB
-
MD5
eda6dde682efacdb0edeb9deb530fcd4
-
SHA1
5fa02b5d7277a6b2f9d5363a78a4b7f4e5c922f8
-
SHA256
034ec32750334586581cbb6d6d66acd153021fc751d5307ba0cfbbb29800c279
-
SHA512
dc9004a01924a6ec6558662fa1bffd626832196f14d6fa82aed426c65a86276b2f99daf688c10bf1421ccbfbbcf6c889cd9a7ae617193d0544de89bd4d76ce8d
-
SSDEEP
384:CCzqi9LxeM27vr0oyGuoiPrG6iSZfI/PKRYD2wp757vt83meFQI760jH:K3yGMrGCAPoO2wFbI+Y
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
034ec32750334586581cbb6d6d66acd153021fc751d5307ba0cfbbb29800c279.doc windows office2003