Behavioral task
behavioral1
Sample
3d76f59c4dceb13546eb9c72a7c0f03fd335093583d326de9a314f3dbd5a77cc.docx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d76f59c4dceb13546eb9c72a7c0f03fd335093583d326de9a314f3dbd5a77cc.docx
Resource
win10v2004-20221111-en
General
-
Target
3d76f59c4dceb13546eb9c72a7c0f03fd335093583d326de9a314f3dbd5a77cc.docx
-
Size
48KB
-
MD5
e66e96db8080b8042ad5691805ca79ac
-
SHA1
22bd61247ada53f582c8897fbef5bb0ddb57cce4
-
SHA256
3d76f59c4dceb13546eb9c72a7c0f03fd335093583d326de9a314f3dbd5a77cc
-
SHA512
cd2d6691cae86d2de8e932cd96100566cfe94ac1c4edcffdd59d1a309b2b2c0ac4e1c9fdd72dd20b526a373903765c0f5624a75d685deecd67ce1617596298f9
-
SSDEEP
768:9rzihs1c4IoFqTblvB9Dmrir8PQk2Cj+Pc:c/oF4BXmriuf+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3d76f59c4dceb13546eb9c72a7c0f03fd335093583d326de9a314f3dbd5a77cc.docx.doc .docx windows office2003
ThisDocument