Behavioral task
behavioral1
Sample
bb34604797db5f3dc8f54225b46de4cbe4af95ccc6596e620577eedfa500c7c2.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bb34604797db5f3dc8f54225b46de4cbe4af95ccc6596e620577eedfa500c7c2.doc
Resource
win10v2004-20240508-en
General
-
Target
bb34604797db5f3dc8f54225b46de4cbe4af95ccc6596e620577eedfa500c7c2
-
Size
45KB
-
MD5
7798fbb8a3c560c5a82d7484aede067e
-
SHA1
53c26027c625c3a25af45ee7daaef5f45755ce84
-
SHA256
bb34604797db5f3dc8f54225b46de4cbe4af95ccc6596e620577eedfa500c7c2
-
SHA512
0c10d04a92a14b9d6c0a4bb5104f1ea8d71ec0084324c7846aa30b05b0f922f05b54989d298eb59579cddb0be5cb2cab87283d2fefd6014094ca8c6ae7e8eab3
-
SSDEEP
384:17TWaWdooIgUt0DiSJPw+QD1HPqdk23e5GnR1+fvI0r3gewkSLUtvapVA1kLQl:pWhdov+kvqdkWR1r0r3gnkRtSjUHl
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
bb34604797db5f3dc8f54225b46de4cbe4af95ccc6596e620577eedfa500c7c2.doc windows office2003