Behavioral task
behavioral1
Sample
INVOICE 589 03_23.doc
Resource
win7-20230220-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
INVOICE 589 03_23.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
INVOICE N L96505 03_23.zip
-
Size
645KB
-
MD5
d7e47631ad707afed1eb1f1db03a89f6
-
SHA1
67aa77cf0576662a8224a251c720b18ea6f63ebf
-
SHA256
51f1fdf15170d27b6c36e52407bc57e614400179e93fb406eb8e8d6a1d3ecfa7
-
SHA512
e6f45bb59d6814a0a5793d372b7937753f2fd722c625350c9a60af42b170ce645711fb25d7972598b29aea64d2053747f41c25cc0ea60437f9e0c756d2ed14f8
-
SSDEEP
3072:C1lsI//z4a/hGS0NclN3U8XKp5ZuoWkQQhl0GEzal3Cj:C12c/z4a5GLNIp1WMkd3tCj
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/INVOICE 589 03_23.doc office_macro_on_action -
Processes:
resource static1/unpack001/INVOICE 589 03_23.doc
Files
-
INVOICE N L96505 03_23.zip.zip
-
INVOICE 589 03_23.doc.doc windows office2003
ThisDocument
Module1