Behavioral task
behavioral1
Sample
3dbc665b89a7a99de58614e905d4fa6105194e6d46d6d36f6756867bcd596564.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3dbc665b89a7a99de58614e905d4fa6105194e6d46d6d36f6756867bcd596564.doc
Resource
win10v2004-20221111-en
General
-
Target
3dbc665b89a7a99de58614e905d4fa6105194e6d46d6d36f6756867bcd596564
-
Size
43KB
-
MD5
c6e31e9db8466b6ce1b1c06a268a7d26
-
SHA1
7be428456ff0716051786179a674875d2ff5a913
-
SHA256
3dbc665b89a7a99de58614e905d4fa6105194e6d46d6d36f6756867bcd596564
-
SHA512
0957d42cdd305967c73ba8734f57114edb2bab252d6834131bc337a0f7bed967dc7388bb4586e516afe8933be6ebafa2b83316699d26587516fbf5803ed44b80
-
SSDEEP
384:xea7HTricaGbkPe5d6pDU9PSpy0jgtHqGRo0QZ0jySGRo0lid:ZJa6kPe5UaAylqG+H9SG+l
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
3dbc665b89a7a99de58614e905d4fa6105194e6d46d6d36f6756867bcd596564.doc windows office2003
ThisDocument