Behavioral task
behavioral1
Sample
Oct PO.docx
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Oct PO.docx
Resource
win10v2004-20220812-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
04f1ff14b9c99537ff9c7eb9a424e03c
-
Size
28KB
-
MD5
04f1ff14b9c99537ff9c7eb9a424e03c
-
SHA1
c8d01a06039b83b83f16f506caf8f8c5ad9f294d
-
SHA256
7e1ac216ac17a1f5314c06daad725cd507eb7bcddad5a568592282dac3380e21
-
SHA512
afc75bb85198d92d6f2c1a39b000209f3368bf5ef3b6231b15d6e528d4279a2cbd8a2ef25f322680288a92b207dd933d713d519cd0363a5908c65265ac72171e
-
SSDEEP
768:4dfpQMdoIaqh0DnwtnLd5hFjDXw/p+gkM9G:4WqAknLPDAEgk+G
Score
10/10
Malware Config
Extracted
Rule
Microsoft Office WebSettings Relationship
C2
http://document_doc@1806450061/uuUASDbjasduhuasduyuASHUDHUSADHUASDU/7jhjjhjhjhhggftftftftftftf.doc
Signatures
-
resource yara_rule sample dropper_html
Files
-
04f1ff14b9c99537ff9c7eb9a424e03c.eml
-
Oct PO.docx.docx office2007
-
email-html-1.txt.html