Behavioral task
behavioral1
Sample
c31453d2feadf041a591515e312b72d7ce4a31843e99e63881621779bd05ff63.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c31453d2feadf041a591515e312b72d7ce4a31843e99e63881621779bd05ff63.doc
Resource
win10v2004-20240226-en
General
-
Target
c31453d2feadf041a591515e312b72d7ce4a31843e99e63881621779bd05ff63
-
Size
2.1MB
-
MD5
368a7eb95ad541f2a6425a59fdacd685
-
SHA1
1213234b153d32bd7834b8ca4e50fc3051012c4b
-
SHA256
c31453d2feadf041a591515e312b72d7ce4a31843e99e63881621779bd05ff63
-
SHA512
079f1934f3f1524b974679bc85ff36f1f1155407d4150a3948509346ca421e927e656e3f684560612018660f5f80ab69e44ddb149a48e563784078a63244b92f
-
SSDEEP
49152:G18vFQ+ZKX2M31OGcu51+/lPE80RpVHH:G18vFQ+ZKX2M31OGcu51+/lPE80RpVn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
c31453d2feadf041a591515e312b72d7ce4a31843e99e63881621779bd05ff63.doc windows office2003
ThisWorkbook
Sheet1
clsNode
clsTreeView
STEPCellMarker
STEPCellStatus
STEPCellStatusTracker
STEPChangeTracker
STEPCommentsHandler
STEPDuplicateDeleteRowHandler
STEPErrorSheetUtils
STEPEscapeUtils
STEPGetNodes
STEPHttpServerCommunication
STEPHttpStatusCodes
STEPInheritanceUtils
STEPLocalization
STEPLogger
STEPLovUtils
STEPModifiedObject
STEPNodeRequestBuilder
STEPRequestBuilder
STEPRequestUtils
STEPResponseParser
STEPSelectionHandler
STEPSeparatorUtils
STEPSet
STEPSheetSetup
STEPSheetUtils
STEPSheetValidator
STEPStyleHelper
STEPSupplierInfo
STEPTemplateProductHelper
STEPTimer
STEPUser
STEPValidatedProduct
STEPValidationCounts
STEPValidationError
STEPXmlAttribute
STEPXmlDom
STEPXmlHttp
STEPXmlNode
STEPXmlNodeList
STEPXmlParseError
STEPLoginForm
STEPLOVForm
STEPNodePicker
STEPValidateForm