Static task
static1
Behavioral task
behavioral1
Sample
Complaint_233.doc
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Complaint_233.doc
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
58f1e98f2ea3934a6f3a4669f3f802f3f140972f97ef36bad032023faddc47cd
-
Size
125KB
-
MD5
4f4a40177ea3993675f8b8d2c10d0cd8
-
SHA1
78973fa1c937b3040203e1749e3d34b2ef49333b
-
SHA256
58f1e98f2ea3934a6f3a4669f3f802f3f140972f97ef36bad032023faddc47cd
-
SHA512
377df5388d9260ab170a88eb493a9c9d0a6d7c221d40e7861694fd5ff0e52cb9deb6bdfeb00045b8f74c0e9280e7f53bf9fa309ceeb46d5850135885edf59115
-
SSDEEP
3072:F6cenUvN8jiMRwPIqRGbnl/iwrM0UrmH0EnAO9Hm70B:gsvN8Hnp/iwrH0KR9Hm70B
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/Complaint_233.doc office_macro_on_action
Files
-
58f1e98f2ea3934a6f3a4669f3f802f3f140972f97ef36bad032023faddc47cd.zip
-
Complaint_233.doc