Behavioral task
behavioral1
Sample
3dd683944cfabb5305a3fce73487da7b6d75581b45d919f17d878134cc64631a.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3dd683944cfabb5305a3fce73487da7b6d75581b45d919f17d878134cc64631a.doc
Resource
win10v2004-20240226-en
General
-
Target
3dd683944cfabb5305a3fce73487da7b6d75581b45d919f17d878134cc64631a
-
Size
106KB
-
MD5
6946667f519c65a79bd97e9682389daa
-
SHA1
1dd03c49fdbabe67c80824554e88e5487118c9cb
-
SHA256
3dd683944cfabb5305a3fce73487da7b6d75581b45d919f17d878134cc64631a
-
SHA512
78973b9b2893fe0f6db26cce885da2f7a5593742ca9a9b95c9f18f579e3dbfd902645a6df75705df1fce84168ccc75abfa0c2547d7f208a83db7d4894fcd012e
-
SSDEEP
768:YedMGUn7V+2iDaSSUS2VP3yLj7XQq0vgSQ5xCYISfU2KbG8a:hHyLjce92YISfU2Bn
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3dd683944cfabb5305a3fce73487da7b6d75581b45d919f17d878134cc64631a.doc windows office2003
ThisDocument
NewMacros