Behavioral task
behavioral1
Sample
72f20edbbc368dd0b3d33e27b4e5390291ef8c4f021a7d1a640587cb8367548b.doc
Resource
win10v2004-20221111-en
windows10-2004-x64
7 signatures
300 seconds
General
-
Target
8942004547.zip
-
Size
3.8MB
-
MD5
ea1c19e547659f34ffdb22779599c648
-
SHA1
f901b54476c1207e7e58404a63a34c93838a71ff
-
SHA256
ad260b9aede81f64d2b06e4b77d64f59b8ef9795d07abfd1df9bcc885d3cf82f
-
SHA512
7318213de9eba82a257eca0ff9fa18910e61f06bc5a6441a04d293b547e4e0b270b9a8d8e58351c0cf1973e39181f4f08f5bfe4841202c16057e748f2b842aeb
-
SSDEEP
98304:ihYOhyVqco8hvlueElpPyvLMb5bWhaVAs1uZq:iPu/hv+pqYVWaWq
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/72f20edbbc368dd0b3d33e27b4e5390291ef8c4f021a7d1a640587cb8367548b office_macro_on_action
Files
-
8942004547.zip.zip
Password: infected
-
72f20edbbc368dd0b3d33e27b4e5390291ef8c4f021a7d1a640587cb8367548b.doc windows office2003