Behavioral task
behavioral1
Sample
34a7cd42a10649b03fdbc945fa9e078377ed5889c187e6b0531ae8a3a36c3ab4.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34a7cd42a10649b03fdbc945fa9e078377ed5889c187e6b0531ae8a3a36c3ab4.doc
Resource
win10v2004-20240226-en
General
-
Target
34a7cd42a10649b03fdbc945fa9e078377ed5889c187e6b0531ae8a3a36c3ab4
-
Size
58KB
-
MD5
2f280563627af914f80629e31a734166
-
SHA1
42a28a4fa6bdb674be63001cd5efff6f7c1b11fc
-
SHA256
34a7cd42a10649b03fdbc945fa9e078377ed5889c187e6b0531ae8a3a36c3ab4
-
SHA512
4bdc8ed7b4285574d07a8d79d940bdf108ab438d005f7db9d48ecd63aff069d98b6cd9e769c0117d390ebce5751140e995bf7433dd9b21a1a5bc7e53e6fe0848
-
SSDEEP
768:pSKqGv9iF7gWMsdMVkK1cdqwEQm0ZD4xz99oinZ:paGv9iF7gWMsdlK1cdqyvZD43
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
34a7cd42a10649b03fdbc945fa9e078377ed5889c187e6b0531ae8a3a36c3ab4.doc windows office2003
ThisDocument