Behavioral task
behavioral1
Sample
3f720fa13882c16e0fa50aa0bbdde30065f45dad6581cbae2b97c5f6a3f9a16f.doc
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3f720fa13882c16e0fa50aa0bbdde30065f45dad6581cbae2b97c5f6a3f9a16f.doc
Resource
win10v2004-20240508-en
General
-
Target
3f720fa13882c16e0fa50aa0bbdde30065f45dad6581cbae2b97c5f6a3f9a16f.doc
-
Size
87KB
-
MD5
6de07ff0cec2965f74dd23474fdfb538
-
SHA1
8f6f38ae20ed7c9fdf36bb9a153aaf0a3959a7f8
-
SHA256
3f720fa13882c16e0fa50aa0bbdde30065f45dad6581cbae2b97c5f6a3f9a16f
-
SHA512
8dc12b2e2e9ede6a6cf83e673a60eb01257d27c97ecce1a2b3d1128c74948cb0c7ce62efb85f342a0cdd59417610a9990e1844c4fb30ae436b76614761a40ddd
-
SSDEEP
1536:+Bocn1kp59gxBK85fBnx+amHIUAHcAdAbRjf7ZD+gB:X41k/W487oRnZlB
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3f720fa13882c16e0fa50aa0bbdde30065f45dad6581cbae2b97c5f6a3f9a16f.doc.doc windows office2003
vUOGvVsqYQkM