Behavioral task
behavioral1
Sample
70fa2300d7932ab901c19878bf109bdd9e078e96380879ca2ce2c3f9fc5c7665.docx
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
70fa2300d7932ab901c19878bf109bdd9e078e96380879ca2ce2c3f9fc5c7665.docx
Resource
win10v2004-20250314-en
General
-
Target
3ebc083d940fcbe17151cbb05496cdb466cd452572e27367ff96331664954cd3.zip
-
Size
17KB
-
MD5
bffb23b8d983909d4758e0270626d0e9
-
SHA1
65e9e47650bb07fefd1be8538bcff08755f212fb
-
SHA256
3ebc083d940fcbe17151cbb05496cdb466cd452572e27367ff96331664954cd3
-
SHA512
76475c0fabd9b076aec5a01abd165a19c43ed8bc46e83342f27bd088c90c9f1dcbffe8a19ed5847abd86e68471237b1df4643c7bcc3f2fade9b71ae55ef172f3
-
SSDEEP
384:aC3oY+Sq279Mb0ABvlG6OOZ6C2gyDoAnk1TbKL4RCbfhRBr8R:j3o2BMb0ABlObzgzAoCbfhR+
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/70fa2300d7932ab901c19878bf109bdd9e078e96380879ca2ce2c3f9fc5c7665.docx office_macro_on_action -
resource static1/unpack001/70fa2300d7932ab901c19878bf109bdd9e078e96380879ca2ce2c3f9fc5c7665.docx
Files
-
3ebc083d940fcbe17151cbb05496cdb466cd452572e27367ff96331664954cd3.zip.zip
Password: infected
-
70fa2300d7932ab901c19878bf109bdd9e078e96380879ca2ce2c3f9fc5c7665.docx.doc .docx windows office2003
ThisDocument