Behavioral task
behavioral1
Sample
341aa7c45a85fbed235086573d4051f832c01596e0bd6009064fdaacc1d1b2ca.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
341aa7c45a85fbed235086573d4051f832c01596e0bd6009064fdaacc1d1b2ca.doc
Resource
win10v2004-20240226-en
General
-
Target
341aa7c45a85fbed235086573d4051f832c01596e0bd6009064fdaacc1d1b2ca
-
Size
58KB
-
MD5
c90634b62d733b2ed38a5cbf87d9fdee
-
SHA1
e5828387cd6f596932d6caebfd76de1df5ba9ee2
-
SHA256
341aa7c45a85fbed235086573d4051f832c01596e0bd6009064fdaacc1d1b2ca
-
SHA512
e90c5918a6bf9a6a524eb555693dfba82500d90c00da06a88688c0f2d590a9d240fd1ca3530bb6d0efb1b9467065a45fa84a1c95410f1b4e358a53908eb8bf60
-
SSDEEP
768:NKKqs8Uq9iF7gWMsdMVkj1cdqt1+YDLxz99oinZ:NSsNq9iF7gWMsdlj1cdqrXDL3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
341aa7c45a85fbed235086573d4051f832c01596e0bd6009064fdaacc1d1b2ca.doc windows office2003
ThisDocument