Behavioral task
behavioral1
Sample
ba3324366a76daea76cb9a0d78c5367085091ec5efa75eb41120d66cee286881.docx
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ba3324366a76daea76cb9a0d78c5367085091ec5efa75eb41120d66cee286881.docx
Resource
win10v2004-20231025-en
General
-
Target
8c25db407a860024f7afdf84badcf4c1.bin
-
Size
212KB
-
MD5
df2d29f4580df8abd6e747462ee7dfd8
-
SHA1
c7d27e89370f7d8be6dd1165e36294cee5ea48e3
-
SHA256
5337668cd197ab1769597c275d57063ded31e5c243240ce6d3730dc7ecd9ecae
-
SHA512
1c0ed0994109b9cbeb22e0f68512231304e32b9907bfc7d94c596d618d1ec25868efc818d8bbed0dbb58821f6908e4febade44a7aca99e3fa2c9720828afd12e
-
SSDEEP
3072:Z9X5/EzuWR5k1Pj0+61J7sVgMJ/gIOiuZMKbgrVfz1pTv4tQvG:Zb/EaWrmP/GMxZOJg1fEu+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/ba3324366a76daea76cb9a0d78c5367085091ec5efa75eb41120d66cee286881.docx office_macro_on_action -
resource static1/unpack001/ba3324366a76daea76cb9a0d78c5367085091ec5efa75eb41120d66cee286881.docx
Files
-
8c25db407a860024f7afdf84badcf4c1.bin.zip
Password: infected
-
ba3324366a76daea76cb9a0d78c5367085091ec5efa75eb41120d66cee286881.docx.doc .docx windows office2003
ThisDocument
NewMacros