Behavioral task
behavioral1
Sample
Contract - 2023-03-07_1155.doc
Resource
win7-20230220-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
Contract - 2023-03-07_1155.doc
Resource
win10v2004-20230221-en
5 signatures
150 seconds
General
-
Target
d349f1543e87e806d98a1787b4690c2f5ea0dce6dc06cd5af52b8a35d81a873e
-
Size
656KB
-
MD5
d51bdc79d00746de5da992c8d8825f32
-
SHA1
ab2af565b410588e9afcc81b3c58065f5831d054
-
SHA256
d349f1543e87e806d98a1787b4690c2f5ea0dce6dc06cd5af52b8a35d81a873e
-
SHA512
f161ae6f4bc76b6dd22d98645615b2d9b34107601d0d1ca964475bc556fe9072cc1e89e7451801fa92dd28c51de7b3e6517b0a977ae5f8237b1ad6e449c530a4
-
SSDEEP
3072:+1lsI//z4a/hGS0NclN3U8XKp5ZuoWkQQhl0GEzal3C8:+12c/z4a5GLNIp1WMkd3tC8
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/Contract - 2023-03-07_1155.doc office_macro_on_action -
resource static1/unpack001/Contract - 2023-03-07_1155.doc
Files
-
d349f1543e87e806d98a1787b4690c2f5ea0dce6dc06cd5af52b8a35d81a873e.zip
-
Contract - 2023-03-07_1155.doc.doc windows office2003
ThisDocument
Module1