Behavioral task
behavioral1
Sample
59ed41388826fed419cc3b18d28707491a4fa51309935c4fa016e53c6f2f94bc.docx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
59ed41388826fed419cc3b18d28707491a4fa51309935c4fa016e53c6f2f94bc.docx
Resource
win10v2004-20240508-en
General
-
Target
59ed41388826fed419cc3b18d28707491a4fa51309935c4fa016e53c6f2f94bc.zip
-
Size
1.5MB
-
MD5
d1a45de040909b207826c8ef7a566d26
-
SHA1
b536268a4491a09c25b7b3fae139839bf58ece27
-
SHA256
dff90fc4438b1ceba9052c15bc752e224c774c9f69802772169f777748f0733b
-
SHA512
0b976f79097e2c80ec2193aa105452d5df2d41bdcfd45e108fa6d17bc62e23a63687b9861b8756952d92845c4239adb1e7c8d7c71554e5bbeeaf2ad5d425e3e4
-
SSDEEP
24576:O6dH1j3MI5WyGBGQBPgBf0mYTpLh0I+CBr9l0IBU+CrXj7GFez4RxLewVvtXUIzU:O6dJ3z5WPBPgBfvYTpVt+CNb0Ii+cTLT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/59ed41388826fed419cc3b18d28707491a4fa51309935c4fa016e53c6f2f94bc.docx office_macro_on_action -
resource static1/unpack001/59ed41388826fed419cc3b18d28707491a4fa51309935c4fa016e53c6f2f94bc.docx
Files
-
59ed41388826fed419cc3b18d28707491a4fa51309935c4fa016e53c6f2f94bc.zip.zip
Password: infected
-
59ed41388826fed419cc3b18d28707491a4fa51309935c4fa016e53c6f2f94bc.docx.doc .docx windows office2003
ThisDocument
UserForm1
UserForm2