Behavioral task
behavioral1
Sample
3795485318d1aae35a7d0a633130b6b2ea5d0e2608ae4e1a3992285757dd67c1.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3795485318d1aae35a7d0a633130b6b2ea5d0e2608ae4e1a3992285757dd67c1.doc
Resource
win10v2004-20220812-en
General
-
Target
3795485318d1aae35a7d0a633130b6b2ea5d0e2608ae4e1a3992285757dd67c1
-
Size
74KB
-
MD5
0a34e0d3a0b8c59ba22f52dbeb8a6330
-
SHA1
814d5bf08ee13637d4f5d091d627de84e21a9ebd
-
SHA256
3795485318d1aae35a7d0a633130b6b2ea5d0e2608ae4e1a3992285757dd67c1
-
SHA512
27409dbb513971783c7f5b9b6986335d2ce412310dfce2264ab30c123b3b6cf4b4b3529f8d3a5241eadac8c8dc1efbcee2291f8047d6ff4f0eb13dd5ad6cffc2
-
SSDEEP
768:2QxnnDakf3woibu69azGw5fvvyD4QUCI4V8q0APo9AgtM2HBhO:2qmkfcbu69azXdvvyD4QUs0APo9P
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
3795485318d1aae35a7d0a633130b6b2ea5d0e2608ae4e1a3992285757dd67c1.doc windows office2003