Behavioral task
behavioral1
Sample
07032023.doc
Resource
win7-20230220-en
11 signatures
150 seconds
General
-
Target
07032023.zip
-
Size
643KB
-
MD5
00c3c36e4c1dec59c286fd0d4bbde1ce
-
SHA1
3b90f99a76fec7eb414befd3cc1bfd82fa9848d8
-
SHA256
78d1770e7f3fe5187075c2091d5ff72acc08e379620f24f1991cdee5945ef7ba
-
SHA512
846a7afb6aef61ddbc13cec42f2d6c3bb8fb493d3725f1b74c43d5c58aeea2fe5feacd31f263792a220b50f636d9f31a49b5bc4bb95e3b13b4fbd6b04618e70a
-
SSDEEP
3072:71lsI//z4a/hGS0NclN3U8XKp5ZuoWkQQhl0GEzal3CX:712c/z4a5GLNIp1WMkd3tCX
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/07032023.doc office_macro_on_action -
resource static1/unpack001/07032023.doc
Files
-
07032023.zip.zip
-
07032023.doc.doc windows office2003
ThisDocument
Module1