Behavioral task
behavioral1
Sample
0bed2094366bb854b0c7db4c6c1b370d2457ab0b324a6ce9c12403db605bb7c8.doc
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0bed2094366bb854b0c7db4c6c1b370d2457ab0b324a6ce9c12403db605bb7c8.doc
Resource
win10v2004-20240226-en
General
-
Target
0bed2094366bb854b0c7db4c6c1b370d2457ab0b324a6ce9c12403db605bb7c8
-
Size
36KB
-
MD5
3a8c66a3ce6262cb80596d9cfe232d5f
-
SHA1
35ec329d8955978f5face7481d5152bba8818575
-
SHA256
0bed2094366bb854b0c7db4c6c1b370d2457ab0b324a6ce9c12403db605bb7c8
-
SHA512
221e3658751c19a4e4db1019f87d67e9fa52beca11d277d4a307db7a5e9e2e3aef7078a02462db2e6359d09e7f96cd97c20871866570e8ff363b33d22e134d73
-
SSDEEP
384:4mmiSupx+Yb5D0TzMPXgu9A0jTEg6TdV8RlxAFEGDIZ9BOtU/:J+Yqw4xyEg6TdV8RlxAFEGDIZT
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0bed2094366bb854b0c7db4c6c1b370d2457ab0b324a6ce9c12403db605bb7c8.doc windows office2003
ThisDocument
NewMacros