Behavioral task
behavioral1
Sample
adjunto_711.doc
Resource
win7-20230220-en
4 signatures
60 seconds
Behavioral task
behavioral2
Sample
adjunto_711.doc
Resource
win10v2004-20230221-en
4 signatures
60 seconds
General
-
Target
2023-3-8-b4020eb96d9c8360624c5a658a153ac0.bin
-
Size
670KB
-
MD5
b4020eb96d9c8360624c5a658a153ac0
-
SHA1
d3d8b42a2051a61c3b30d6763be756e3fe953c95
-
SHA256
7a9e245e574234e8f35d8cfcd5cf774e270b0b87a2e4a17ee6c87c503b3b62f8
-
SHA512
f381821a450de2a7fbad3034f780b771e2fb2ac543f9d3cc3672081e967c1b5ce930cd01223df37958891bef40d6ed92ad7e16718100b23d2f4b2d05db03d07a
-
SSDEEP
6144:AJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqM:EbPHom8TYyCT8x5I5wL
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/adjunto_711.doc office_macro_on_action -
resource static1/unpack001/adjunto_711.doc
Files
-
2023-3-8-b4020eb96d9c8360624c5a658a153ac0.bin.zip
-
adjunto_711.doc.doc windows office2003
ThisDocument
Module1