Behavioral task
behavioral1
Sample
389d5fd483539040c28707e4e4ccaa3eb775fb8e6946453d3ef284eed1d9b6af.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
389d5fd483539040c28707e4e4ccaa3eb775fb8e6946453d3ef284eed1d9b6af.doc
Resource
win10v2004-20240508-en
General
-
Target
389d5fd483539040c28707e4e4ccaa3eb775fb8e6946453d3ef284eed1d9b6af
-
Size
36KB
-
MD5
b68384bd75e1b2e9de6cebe6967c5bee
-
SHA1
ef14c2262e2366f425458f6a4a8a962451d50d08
-
SHA256
389d5fd483539040c28707e4e4ccaa3eb775fb8e6946453d3ef284eed1d9b6af
-
SHA512
a407c4528f4411d2039cc86415b3d8fabeb869cb33ad51d75eb44c8a80fe06e870d96bdc575eec7f9ecdb1b73387ce4624ca28e4e7d267ab797504fef33768fb
-
SSDEEP
384:dyiSwvxjk+tiPTj6Otg0jk+pdyA5tJ/hO:d1xw+tc6OSJ+pdvO
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
389d5fd483539040c28707e4e4ccaa3eb775fb8e6946453d3ef284eed1d9b6af.doc windows office2003
ThisDocument
NewMacros