Behavioral task
behavioral1
Sample
Open invoices.doc
Resource
win7-20220812-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
Open invoices.doc
Resource
win10v2004-20220812-en
10 signatures
150 seconds
General
-
Target
ab1c91834d509b9a034cc465be931ecbde96089008ce5a685cef690cb5a73e84
-
Size
94KB
-
MD5
fa434290eb58c161c461567f417f9e98
-
SHA1
8569d49c0ae9715616e528b2270c666088b1ff15
-
SHA256
ab1c91834d509b9a034cc465be931ecbde96089008ce5a685cef690cb5a73e84
-
SHA512
382698f8bd5a5955ec1ae8615ac84d680440484704961c1e808224df8a9fb2404e73b85d9941ca1daf16a510ce845e8f80ad55d3b16dceb3ce43eee596f01d1a
-
SSDEEP
1536:1moTDt2AJSKWWF6YIIAjGMcn6DIW2jAL9NQ+YsSLiL0naTX:1JTDt2nKL8q7gle+9NPxSLiz
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/Open invoices.doc office_macro_on_action -
resource static1/unpack001/Open invoices.doc
Files
-
ab1c91834d509b9a034cc465be931ecbde96089008ce5a685cef690cb5a73e84.zip
Password: infected
-
Open invoices.doc.doc windows office2003
ThisDocument
rWKNDOtqzlBS
cUCdOiPzPPW
inAiMtcBdKN
qnBNBmZvOkN