Behavioral task
behavioral1
Sample
ba64d69516da5815369a03f25e567a3edf1473e6da5884b1485f3142d334767f.docx
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ba64d69516da5815369a03f25e567a3edf1473e6da5884b1485f3142d334767f.docx
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
ba64d69516da5815369a03f25e567a3edf1473e6da5884b1485f3142d334767f.docx
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
ba64d69516da5815369a03f25e567a3edf1473e6da5884b1485f3142d334767f.docx
Resource
win11-20231215-en
General
-
Target
3dfddb91261f5565596e3f014f9c495a.bin
-
Size
10KB
-
MD5
52c91a5ae307dfc8d680f7b572f669a7
-
SHA1
ffbf7a373e0c77cf1c60375d3be4926138d1a834
-
SHA256
ece3770f4398c3cc2c3750a8206260a27c0094046718c376cfac37530bb4f362
-
SHA512
f3708ac39f1756b73adc9854e1fa5e66ce5167695863fa7c2a6df16dcfc70d5454043fa95887245c79189638817428cfbafa5d3bd6b14d7b8b5d9d15c0a75707
-
SSDEEP
192:wA5H9WYajUIp4REf7m9uVhTsLHaU64BUhVXHDVjeCVeaK:wCvDrpRUzzVif
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/ba64d69516da5815369a03f25e567a3edf1473e6da5884b1485f3142d334767f.docx office_macro_on_action -
resource static1/unpack001/ba64d69516da5815369a03f25e567a3edf1473e6da5884b1485f3142d334767f.docx
Files
-
3dfddb91261f5565596e3f014f9c495a.bin.zip
Password: infected
-
ba64d69516da5815369a03f25e567a3edf1473e6da5884b1485f3142d334767f.docx.doc .docx windows office2003
ThisDocument
NewMacros