Behavioral task
behavioral1
Sample
3924590aece3606fc201c7f56b790e8de2330bba86124b24c5dd47bcb309dd4d.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3924590aece3606fc201c7f56b790e8de2330bba86124b24c5dd47bcb309dd4d.doc
Resource
win10v2004-20221111-en
General
-
Target
3924590aece3606fc201c7f56b790e8de2330bba86124b24c5dd47bcb309dd4d
-
Size
25KB
-
MD5
cfa60dc720bb859c06258299ad79f858
-
SHA1
c0e6167628d3464e78ca28e4b4630e4c22575df8
-
SHA256
3924590aece3606fc201c7f56b790e8de2330bba86124b24c5dd47bcb309dd4d
-
SHA512
ace0e5edb1320e2cc9a15af19a2467d0ed0db3352b64dc657ba8edef6a3cea4b02bbcf9759a1cceabb51a824d590bff17e03c99638d316eb46c802dd3ae56b00
-
SSDEEP
384:DAh3Jb7zBwDAQe50jcuthHaema1xSEd2S4sP3xufx:Wb7zqO4aema1xS8Bxufx
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
3924590aece3606fc201c7f56b790e8de2330bba86124b24c5dd47bcb309dd4d.doc windows office2003
ThisDocument
myf
aMlX2k
aNx8Ln
anRBTI