Behavioral task
behavioral1
Sample
bddb85a80b8a2bbff7d4fd896e423b814822169e149f93e2966b8f1264a1feda.pps
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bddb85a80b8a2bbff7d4fd896e423b814822169e149f93e2966b8f1264a1feda.pps
Resource
win10v2004-20240508-en
General
-
Target
bddb85a80b8a2bbff7d4fd896e423b814822169e149f93e2966b8f1264a1feda
-
Size
2.2MB
-
MD5
aa92861a365dc4676fc88ae6a65ddb10
-
SHA1
a835c8064074279e5673e8fdd57a217f1cac719c
-
SHA256
bddb85a80b8a2bbff7d4fd896e423b814822169e149f93e2966b8f1264a1feda
-
SHA512
bfabd3cf8313aa50db4cd58adbf9bdebba31ef2abb325c6b3eccf803eb04221d61ee263d02be0175c9fc8c1c847e9c7728151ac928252a2ac7bc050a549d7468
-
SSDEEP
12288:/w5DF4CvCl2twkW5pgpf9rU+Jf2IkTDEpUfZXGahQio8GwdamJs3u9SqdYd5yLPF:xmQ0h3uomJsd4f
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bddb85a80b8a2bbff7d4fd896e423b814822169e149f93e2966b8f1264a1feda.pps windows office2003
Module1