Static task
static1
Behavioral task
behavioral1
Sample
PrinterBase-Invoice#1411-776-2020.doc
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PrinterBase-Invoice#1411-776-2020.doc
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
PrinterBase-Invoice#1411-776-2020.doc
-
Size
1.4MB
-
MD5
48914d38a1c1695f05af14fce3d6243a
-
SHA1
308dd4e3ce1f62affe4bc0cddd42d733a398d4f9
-
SHA256
3d698d68e564b049fecafafbe510b2954fe95b4725ecad134992e3acd2671b49
-
SHA512
4925d65eb07f7bd6e77004d3e23c02a82c511de475def72a4ed079aba85af34f2a44ae95a0174083433226e8135b8a8312b13331486064b0c8ccfea180857727
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action
Files
-
PrinterBase-Invoice#1411-776-2020.doc.doc windows office2003
ThisDocument
UserForm1
Class1