Static task
static1
Behavioral task
behavioral1
Sample
invoice-02-01-2022.xls
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
invoice-02-01-2022.xls
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
invoice-02-01-2022.zip
-
Size
27KB
-
MD5
0816703c1b37d2cdc0d99dc9380030c3
-
SHA1
b437d95bd0b39073065f62422fe3e64466aecb5e
-
SHA256
d91a7c741f9ab4ef681cb4924bb04453494c5a39762501258dabf202b8ec0f0a
-
SHA512
f40d8ce12574e331f4dd34da3a9b88aa508bd5e84f3c7eefb93d1d0842b7f2785a2c7d561470558076e472cbb1855f90e8f1bdc72b82a4d208cb65a0b663787d
-
SSDEEP
768:oUV0xp6D6Hem4irnqt5y0fPNbuSek1XRMQZso:DVInHeZirnq7jXek1GQZb
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/invoice-02-01-2022.xls office_macro_on_action -
Processes:
resource static1/unpack001/invoice-02-01-2022.xls
Files
-
invoice-02-01-2022.zip.zip
Password: infected
-
invoice-02-01-2022.xls.xls windows office2003
Module1
ThisWorkbook
Sheet1