Behavioral task
behavioral1
Sample
3d6526dbdba401ed31b6743f97af1f54b8c6c40b7ab79de845937a7a20fa6d39.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d6526dbdba401ed31b6743f97af1f54b8c6c40b7ab79de845937a7a20fa6d39.doc
Resource
win10v2004-20240730-en
General
-
Target
3d6526dbdba401ed31b6743f97af1f54b8c6c40b7ab79de845937a7a20fa6d39
-
Size
51KB
-
MD5
1fed6b0c5e2f96c1787cf90804d50a3c
-
SHA1
f93237d106a36133c71df0de181bf73d7407484d
-
SHA256
3d6526dbdba401ed31b6743f97af1f54b8c6c40b7ab79de845937a7a20fa6d39
-
SHA512
5b12084f9d690e9b589cb07c4aedf3680392a29e744ae367ccac4ffd4490f1df4f5446f5fb93cf71827c7ca2061c047593a116838cea8d540d68e1bf2e83b863
-
SSDEEP
768:mwIIIIIJbIsR+k5++M5y7iIP4KDDaxhXM:0kk8Hy7iIP4cDchX
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
3d6526dbdba401ed31b6743f97af1f54b8c6c40b7ab79de845937a7a20fa6d39.doc windows office2003
ThisDocument
NewMacros