Behavioral task
behavioral1
Sample
680c030919d9e1902e2a70f21b11fc74ce54f14a162606838ada8d26212ebb5b.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
680c030919d9e1902e2a70f21b11fc74ce54f14a162606838ada8d26212ebb5b.vbs
Resource
win10v2004-20240226-en
General
-
Target
680c030919d9e1902e2a70f21b11fc74ce54f14a162606838ada8d26212ebb5b
-
Size
764KB
-
MD5
b4e8176179e96b181ad56a3e5485c6d6
-
SHA1
234b7bd458d25f3928ba1c5fe4f9ad104d8d9462
-
SHA256
680c030919d9e1902e2a70f21b11fc74ce54f14a162606838ada8d26212ebb5b
-
SHA512
df19011270e9dd269af270f62db7fa35ca17de88c2730b603f5255187e530c961f403a1712760ce0fbad9b56033e89b1050471df59523db3deafc87eb08a848f
-
SSDEEP
6144:8AB4w37FvpexSktyxlUXBriRX5iI2u/93JdGsqSkMJ9ogSgs5a2mMosTlIbRBV1:7BL7FRaSY51IbdnqoJ9dV7gePV1
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
680c030919d9e1902e2a70f21b11fc74ce54f14a162606838ada8d26212ebb5b.doc .vbs windows office2003 polyglot
ThisWorkbook
Sheet1
BneVBAProperty
BneBrowser
BneSummarySheet
bneMain
bneMsgLogger
BneVBAInterfaceCol
BneDownloadHTTPHandler
BneVBAGraphs
BneVBAMessages
Sheet2
BneMultiInterfaces
BneVBAGraph
bneReadOnlyUtils
BneVBAProperties
BneVBAParameter
BneUploadSettings
BneVBAMessage
bneRibbonUtils
BneVBAParameters
BneVBAUploader