Behavioral task
behavioral1
Sample
INVOICE 589 03_23.doc
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
INVOICE 589 03_23.doc
Resource
win10v2004-20230220-en
11 signatures
150 seconds
General
-
Target
INVOICE N L96505 03_23.zip.zip
-
Size
123KB
-
MD5
b4d9ac56942fb6ab57cc28b947c7d278
-
SHA1
171ab143af60b540b8aa0b1197c6a348f59d3627
-
SHA256
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7
-
SHA512
8512301f7bf044810e3cf2727fa070c1e6a7f7612f2a45dcb54aff7e32214d32b676773022bd78c74177446253343204294d2fe6de4e07a59c478b6dbf81d706
-
SSDEEP
3072:5WFzVmFLqGKCSGpu84arlZF3/FWI/GhdMy+EOikEefP6jWiY:YB0q6PMarfFPEIuD+EOiHefPWY
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack002/INVOICE 589 03_23.doc office_macro_on_action -
resource static1/unpack002/INVOICE 589 03_23.doc
Files
-
INVOICE N L96505 03_23.zip.zip.zip
Password: infected
-
INVOICE N L96505 03_23.zip.zip
-
INVOICE 589 03_23.doc.doc windows office2003
ThisDocument
Module1