Behavioral task
behavioral1
Sample
3ddde45f1f2ab8608d58be075d4f84c51b8ce137c91a6c48baf75f4f170be65f.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3ddde45f1f2ab8608d58be075d4f84c51b8ce137c91a6c48baf75f4f170be65f.doc
Resource
win10v2004-20240226-en
General
-
Target
3ddde45f1f2ab8608d58be075d4f84c51b8ce137c91a6c48baf75f4f170be65f
-
Size
47KB
-
MD5
0465667c6cf6fb7d93689c9718a07c01
-
SHA1
8abc5bea2bedeb0b065661580f09549972b50b60
-
SHA256
3ddde45f1f2ab8608d58be075d4f84c51b8ce137c91a6c48baf75f4f170be65f
-
SHA512
1e98691d00d5245d4076c29ccf6c68a9895bcdb896e8578b261a77691571576b47bcc572910f9fd438bc6a62169ffd3a2584db1aeb88f69702569a2d0ae6dd56
-
SSDEEP
768:u8U7zgSlE45YA7fXjgNmwuwAYk1NQ4Wkx2w:WzgSq45YA7fsNtuwAYk1N3Wkv
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
3ddde45f1f2ab8608d58be075d4f84c51b8ce137c91a6c48baf75f4f170be65f.doc windows office2003