Behavioral task
behavioral1
Sample
bac1971dd8705ade935d708da5ce77636029afdfdd9404121d6a667c2b48742f.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bac1971dd8705ade935d708da5ce77636029afdfdd9404121d6a667c2b48742f.doc
Resource
win10v2004-20240226-en
General
-
Target
bac1971dd8705ade935d708da5ce77636029afdfdd9404121d6a667c2b48742f
-
Size
212KB
-
MD5
5cb2d89cc1cf5bf4f6a5e914009e716a
-
SHA1
a9a65f815c63120354a563197ad9086183e17080
-
SHA256
bac1971dd8705ade935d708da5ce77636029afdfdd9404121d6a667c2b48742f
-
SHA512
b8dc86f6241820228ba98b148e9d0bb5a486cd746c0dcab034e6715656ab138c741f7d83c39fde798cdcee181f0075efc915608a5df7c422a0cf887c6d93cb3d
-
SSDEEP
6144:BXzGkNrKGsLrn1qSaFdcCDA/JcjuzwctLZA71CU/SL:BXzGkNrKGsLrn1qSa7cCDuJ4uzwMApCR
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bac1971dd8705ade935d708da5ce77636029afdfdd9404121d6a667c2b48742f.doc windows office2003
ThisDocument
ModuleDiverse
ModuleRegistry
ModuleScramble
ModuleGlobale
UserFormWaitForMaxima
mUnviewable
ModuleAutoMacros
CMG
DPB
GC
ModuleWordMatWrap
VBAextensions
MaximaWSH
PublicModulesForWordMat
ModuleWindowsFunctions
MaximaDirectdll
oAppClass