Static task
static1
Behavioral task
behavioral1
Sample
45c88d752c7ce1703b069be32f78a3a0d06603263bdefb53de5f6f27356fe438.bin.doc
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
45c88d752c7ce1703b069be32f78a3a0d06603263bdefb53de5f6f27356fe438.bin.doc
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
7a.zip
-
Size
57KB
-
MD5
48b337010f3dcafc2aabdb24c63e041e
-
SHA1
46d08c15b1c4b0b7c1bed75cd702ed7457c04077
-
SHA256
ed7e03e087842943672e73b01ad8d191a045f7e18908756654cabdc140cb2e74
-
SHA512
96d524d7ee5d8929fad7d6c1f7738ff9fc7b6de05004d0fd566a4bf3258677866b70be3cf559ae077910c488ea68399727590a9da0ca1429f68eb1863a2751a1
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule static1/unpack001/45c88d752c7ce1703b069be32f78a3a0d06603263bdefb53de5f6f27356fe438.bin office_macros
Files
-
7a.zip.zip
Password: infected
-
45c88d752c7ce1703b069be32f78a3a0d06603263bdefb53de5f6f27356fe438.bin.doc office2007
ThisDocument
UserForm1
clearPaste
nextWTemp
constRequest