Behavioral task
behavioral1
Sample
3dcdaeb83e0dd75263b8206e15ba60c1848c3c9ccf0ead21933ade48ff96ebb8.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3dcdaeb83e0dd75263b8206e15ba60c1848c3c9ccf0ead21933ade48ff96ebb8.doc
Resource
win10v2004-20240508-en
General
-
Target
3dcdaeb83e0dd75263b8206e15ba60c1848c3c9ccf0ead21933ade48ff96ebb8
-
Size
32KB
-
MD5
e59a16ba652e810cf09ea1e1cc3e1711
-
SHA1
e136f3bb3ad93f2ff49f8712aefca3ade5c354f6
-
SHA256
3dcdaeb83e0dd75263b8206e15ba60c1848c3c9ccf0ead21933ade48ff96ebb8
-
SHA512
e45bf06d2ce507cec3c364e8575d0ac478473486bd38508db96046a3e47cb474aa71ea8aa4f49c3d35bbdb9194d735b45a85c93b3b96cdf276567b0f2dad1dbe
-
SSDEEP
192:PpQLcjHF6wZEvAqADsu6/6rJ984woO+QHj1qqadLeubE3gGsD49+kCg50jM/stfO:Pp7FiSJPw+QD1qqwbVw+kCg50jEstXM
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
3dcdaeb83e0dd75263b8206e15ba60c1848c3c9ccf0ead21933ade48ff96ebb8.doc windows office2003
ThisDocument
Module1