Behavioral task
behavioral1
Sample
3885d8aea20e99ed2b3a8a45cd4a2098dc26ab9ab9f2a444332be40dfad1c879.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3885d8aea20e99ed2b3a8a45cd4a2098dc26ab9ab9f2a444332be40dfad1c879.doc
Resource
win10v2004-20240508-en
General
-
Target
3885d8aea20e99ed2b3a8a45cd4a2098dc26ab9ab9f2a444332be40dfad1c879
-
Size
520KB
-
MD5
de87f9a3481e3e9e0defe77cd0d024ac
-
SHA1
d5635466c74a3e9310d0bee5a177a60cc974a32e
-
SHA256
3885d8aea20e99ed2b3a8a45cd4a2098dc26ab9ab9f2a444332be40dfad1c879
-
SHA512
0312830e0278aed04b4beef1e0e0ee2e8a463b6d95f674f9c9ccf52fc109a67c6c55c095856ca2a91584c82f81e868fab5228286f1ffe95eb98d007e645ab81f
-
SSDEEP
6144:UyhOEbYb0KCTp40Tx+l4XAzppgj/X1jMvvv2vvvvvhvvvvvivvvvjzjMvvv0vvvg:UlkYsD
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action
Files
-
3885d8aea20e99ed2b3a8a45cd4a2098dc26ab9ab9f2a444332be40dfad1c879.doc windows office2003