Behavioral task
behavioral1
Sample
39cf17c1bb5d5072a0c092d103ab7f6c9d9a60129daa70343bd64e92aca58859.doc
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
39cf17c1bb5d5072a0c092d103ab7f6c9d9a60129daa70343bd64e92aca58859.doc
Resource
win10v2004-20231023-en
General
-
Target
39cf17c1bb5d5072a0c092d103ab7f6c9d9a60129daa70343bd64e92aca58859.doc
-
Size
49KB
-
MD5
b31dab6de4ef9f7094693326fb3721be
-
SHA1
514802da964cd6491600ababb2d9b1df948b6ef3
-
SHA256
39cf17c1bb5d5072a0c092d103ab7f6c9d9a60129daa70343bd64e92aca58859
-
SHA512
7974baba252bbff25f4ee37acac88cfc73d9f724c09807bbe3d687a7ed3e1f8ec5c7a598ee758c7cdee4677ab342e86a4165b0a5b310ca3a55d1bb1c1391ccbe
-
SSDEEP
384:LE8iSwvxjk+tyP+MkCjCnuCLFg0jY4XXsz/DBrpstJ/ZgO6x5:Lqxw+tC+8SpugkNFdr
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
39cf17c1bb5d5072a0c092d103ab7f6c9d9a60129daa70343bd64e92aca58859.doc.doc windows office2003
ThisDocument
NewMacros