Behavioral task
behavioral1
Sample
3a45ae688a6fc85ba5dbbf728d95ea8332b050871db0f2546bde5831cdb46d00.doc
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3a45ae688a6fc85ba5dbbf728d95ea8332b050871db0f2546bde5831cdb46d00.doc
Resource
win10v2004-20240426-en
General
-
Target
3a45ae688a6fc85ba5dbbf728d95ea8332b050871db0f2546bde5831cdb46d00
-
Size
32KB
-
MD5
382d73b849e8db58cd932546dc3c50a4
-
SHA1
c21023ebc16b6197a7a8098e262da133bca74838
-
SHA256
3a45ae688a6fc85ba5dbbf728d95ea8332b050871db0f2546bde5831cdb46d00
-
SHA512
f10da526ae20e57dbdcc53e35a44a29dc1acc8c2d50bec17088c5c3fe4dd456feb88c28255d06fd6871df7273f621961496ae62815aa1828b55c08f128f0d885
-
SSDEEP
384:AHgJifiSJPw+QD1z4n9cJQClqX50jRHst7+:SgJj+k89ow
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3a45ae688a6fc85ba5dbbf728d95ea8332b050871db0f2546bde5831cdb46d00.doc windows office2003
ThisDocument
Module1