Behavioral task
behavioral1
Sample
3861f8170b0610d21cfaee08b9a787719e2581a5453c6896fd00b78e0643e0a1.doc
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3861f8170b0610d21cfaee08b9a787719e2581a5453c6896fd00b78e0643e0a1.doc
Resource
win10v2004-20221111-en
General
-
Target
3861f8170b0610d21cfaee08b9a787719e2581a5453c6896fd00b78e0643e0a1
-
Size
94KB
-
MD5
9c0cb90eb98c1ce14538904fd5d4b571
-
SHA1
1921bff5108fa3fc5fc2cc25737c0161eb51ab09
-
SHA256
3861f8170b0610d21cfaee08b9a787719e2581a5453c6896fd00b78e0643e0a1
-
SHA512
1b3886044094b4159a51b0b501aceba62e402ecf7e48e494ef4e5c3d77c27f51d78f65606595aaf112dcea2d07fedefc6f767e54285ce3f63ed711cf4aa9fe5b
-
SSDEEP
768:Kjrn5E7Uv4Mpr/BoBgqqk1HgCrhtO0KdYlPWdKAFwYS4oQbet+4+Dc8mynthTJzi:udF1+Bggr7FlP2q+gcfSx2+nh
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3861f8170b0610d21cfaee08b9a787719e2581a5453c6896fd00b78e0643e0a1.doc windows office2003
ThisDocument
Module2
Module4
Module3