Behavioral task
behavioral1
Sample
K-0703.doc
Resource
win7-20230220-en
windows7-x64
4 signatures
60 seconds
Behavioral task
behavioral2
Sample
K-0703.doc
Resource
win10v2004-20230221-en
windows10-2004-x64
4 signatures
60 seconds
General
-
Target
2023-3-8-708f2e41f67fa905302b24780e57d8d5.bin
-
Size
667KB
-
MD5
708f2e41f67fa905302b24780e57d8d5
-
SHA1
6f9c63dd151b45fd79130f7bcf59f6a928284706
-
SHA256
857cb73fe27bd1614303444e7d835561650233905c31b26e7d2f0872792bcc1c
-
SHA512
d9e28dae6826355cbc4ef7768ef3ca08bb984116562bde242ec838df90d20f0b63e27e682b92d0fc804f1dfb51430ac060fa3b35760657122fe162007c6b25e9
-
SSDEEP
3072:P1lsI//z4a/hGS0NclN3U8XKp5ZuoWkQQhl0GEzal3CS:P12c/z4a5GLNIp1WMkd3tCS
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/K-0703.doc office_macro_on_action -
resource static1/unpack001/K-0703.doc
Files
-
2023-3-8-708f2e41f67fa905302b24780e57d8d5.bin.zip
-
K-0703.doc.doc windows office2003
ThisDocument
Module1