Behavioral task
behavioral1
Sample
3879498f43bd4784cd1397ed4fb2f20fbf0b8fa5b0994b6d7166969d108f4b80.doc
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3879498f43bd4784cd1397ed4fb2f20fbf0b8fa5b0994b6d7166969d108f4b80.doc
Resource
win10v2004-20240226-en
General
-
Target
3879498f43bd4784cd1397ed4fb2f20fbf0b8fa5b0994b6d7166969d108f4b80
-
Size
1.4MB
-
MD5
7b91f06584afdc4a2aa6edd9d04198b7
-
SHA1
bf72582f722db079ea993721e8078d49ef5fc064
-
SHA256
3879498f43bd4784cd1397ed4fb2f20fbf0b8fa5b0994b6d7166969d108f4b80
-
SHA512
f0997f99caebf2a5dcacff9e481b9bc23564daa90641f2422e7782fdfc4a68773a8919947dc3610ecb13bfd09900232be3b631c91188209cd27a84cf43916b7e
-
SSDEEP
12288:6mXSqeYCxWHHqCfBtmXnMwfhZzsNIKWLdfzm/t:VGYiWHHdfBtoBNsN4LdfC/t
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3879498f43bd4784cd1397ed4fb2f20fbf0b8fa5b0994b6d7166969d108f4b80.doc windows office2003
ThisDocument