Behavioral task
behavioral1
Sample
3cfcda6404ca1b14cd0bbfa560b38aff76da09337d494dbb257e6ef41232662e.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3cfcda6404ca1b14cd0bbfa560b38aff76da09337d494dbb257e6ef41232662e.doc
Resource
win10v2004-20240226-en
General
-
Target
3cfcda6404ca1b14cd0bbfa560b38aff76da09337d494dbb257e6ef41232662e
-
Size
58KB
-
MD5
e92bfddecca1c1b71738511735c005a9
-
SHA1
cdf858add61db5c44503f78cda67915ddb0f77d6
-
SHA256
3cfcda6404ca1b14cd0bbfa560b38aff76da09337d494dbb257e6ef41232662e
-
SHA512
bf48552c783da8c5ab885b25970bf639c85cb23511ab480db6d15a4e782a2658b80dcf8607b9d584a77bf56bce4330421b2a5622efdb76d4b05e99f6d51e2b10
-
SSDEEP
768:puK63c4X9iF7gWMsdMVku1cdqbgXyDPxz99oinZ:pm3ca9iF7gWMsdlu1cdqkCDP3
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3cfcda6404ca1b14cd0bbfa560b38aff76da09337d494dbb257e6ef41232662e.doc windows office2003
ThisDocument