Behavioral task
behavioral1
Sample
INVOICE 2023-03-07_1213, United States.doc
Resource
win7-20230220-en
4 signatures
60 seconds
Behavioral task
behavioral2
Sample
INVOICE 2023-03-07_1213, United States.doc
Resource
win10v2004-20230220-en
4 signatures
60 seconds
General
-
Target
2023-3-8-d7c281d6c4c64ce096c504ef3920921a.bin
-
Size
667KB
-
MD5
d7c281d6c4c64ce096c504ef3920921a
-
SHA1
5f2b332e6b4aa8ca351447a54128d319dad182eb
-
SHA256
3d5a697924d41024844d710e640fde71fde15a8a7db1692f4aa6ab3d616f5ed5
-
SHA512
a3b8284e7677445f0c7b97df0635b32cad15654b29c00eb5ec87670ff44ebe1b03744bad5b6be601fce5f4800cc3babfceb9752e630d20602a8830a0713092c4
-
SSDEEP
3072:S1lsI//z4a/hGS0NclN3U8XKp5ZuoWkQQhl0GEzal3Cd:S12c/z4a5GLNIp1WMkd3tCd
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/INVOICE 2023-03-07_1213, United States.doc office_macro_on_action -
resource static1/unpack001/INVOICE 2023-03-07_1213, United States.doc
Files
-
2023-3-8-d7c281d6c4c64ce096c504ef3920921a.bin.zip
-
INVOICE 2023-03-07_1213, United States.doc.doc windows office2003
ThisDocument
Module1