Behavioral task
behavioral1
Sample
2023-03-08_0907.doc
Resource
win7-20230220-en
12 signatures
150 seconds
General
-
Target
Haseko.co.zip
-
Size
686KB
-
MD5
2d205f5a5d2bea63a188afce08da6165
-
SHA1
c3dc95d47734f5d9a786f07f38f66ecadcb7efc4
-
SHA256
1de6355dc07901be94a27bd9f3ee4e61ba289d71ca693a2b182b4874facf864e
-
SHA512
74fffaf93659fe34c77b497d906482b7b980ffa5cc79979afced017da094c0638e1e872a87a62fd3a304b281043fd43557cb63dcc503ef90b6c49f4fadb9a755
-
SSDEEP
6144:kJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqR:IbPHom8TYyCT8x5I5wW
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/2023-03-08_0907.doc office_macro_on_action -
resource static1/unpack001/2023-03-08_0907.doc
Files
-
Haseko.co.zip.zip
-
2023-03-08_0907.doc.doc windows office2003
ThisDocument
Module1