Behavioral task
behavioral1
Sample
b3436daa5ce66958ebdce915b342d281640b67a939b837c3cfebcdd7cfad344c.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b3436daa5ce66958ebdce915b342d281640b67a939b837c3cfebcdd7cfad344c.doc
Resource
win10v2004-20221111-en
General
-
Target
b3436daa5ce66958ebdce915b342d281640b67a939b837c3cfebcdd7cfad344c
-
Size
625KB
-
MD5
9bf05faeb045ccdfe9fafc6e6cfdb81d
-
SHA1
bd328cf093335a3afdbbe7fd6eeb7c9aee31bcfb
-
SHA256
b3436daa5ce66958ebdce915b342d281640b67a939b837c3cfebcdd7cfad344c
-
SHA512
ce41373f7fec593d1bc99a6dec99ea39ea7490f9fc392aca70da542d185ec69bff303b87da87b9fcfd7770a9ee3819394c0e64f25c96e88cd88d87c5a6ca46f7
-
SSDEEP
12288:JeUKy1sk6MkjHK2qEzW4VAQ+c6UVksDXtjQrvc9hCTPns1Bn3nkZhE6dZIDHIXA:QUf1sk6Mkj7NAGVkmdjQ74hKs3n3awrT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
b3436daa5ce66958ebdce915b342d281640b67a939b837c3cfebcdd7cfad344c.doc windows office2003