Behavioral task
behavioral1
Sample
MK03746625581414709J.doc
Resource
win7-20230220-en
4 signatures
60 seconds
Behavioral task
behavioral2
Sample
MK03746625581414709J.doc
Resource
win10v2004-20230220-en
4 signatures
60 seconds
General
-
Target
2023-3-8-caf09f5af2e6055ddfedcde86e6b408a.bin
-
Size
642KB
-
MD5
caf09f5af2e6055ddfedcde86e6b408a
-
SHA1
64d587ba797fa4b4bae809e633f588660b67fdee
-
SHA256
3b23eb2025a711b62ef42fbe43ad35c8d610e31343e556b24fe9d13491eaf18d
-
SHA512
b6dc7565692136ddef0d84ea813132ab175badb2df08a09840dc247e7e0a538295f648a48e8f676424864f8fbe5e3960ada88ddb04c09c47834c96f5366ffabb
-
SSDEEP
3072:71lsI//z4a/hGS0NclN3U8XKp5ZuoWkQQhl0GEzal3C9:712c/z4a5GLNIp1WMkd3tC9
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/MK03746625581414709J.doc office_macro_on_action -
resource static1/unpack001/MK03746625581414709J.doc
Files
-
2023-3-8-caf09f5af2e6055ddfedcde86e6b408a.bin.zip
-
MK03746625581414709J.doc.doc windows office2003
ThisDocument
Module1