Behavioral task
behavioral1
Sample
3bc9b21923314f4f849fc6d2e2fdeb3377a0768e57220d3d38ff2431f6607099.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3bc9b21923314f4f849fc6d2e2fdeb3377a0768e57220d3d38ff2431f6607099.doc
Resource
win10v2004-20240226-en
General
-
Target
3bc9b21923314f4f849fc6d2e2fdeb3377a0768e57220d3d38ff2431f6607099
-
Size
25KB
-
MD5
205016c7a03e02145c77ebadc8b43561
-
SHA1
edbef61276f398e354ca6bca2dee3e72757586ea
-
SHA256
3bc9b21923314f4f849fc6d2e2fdeb3377a0768e57220d3d38ff2431f6607099
-
SHA512
74f5f5282bfcbae221109b4e00404dbf791a1d944a8d85dcf1a4e6b7e801b62e8a91a6ce61e53fac0733b83956def3d862571e9cc6cc187b591db4fab965983a
-
SSDEEP
384:uDDfIAHpmgR2og/Mus5fJUN0j62t4zSF6e:uD0dsJkTrzSF6e
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3bc9b21923314f4f849fc6d2e2fdeb3377a0768e57220d3d38ff2431f6607099.doc windows office2003
ThisDocument
Module1
Module2