Behavioral task
behavioral1
Sample
2023-03-08_1035.doc
Resource
win7-20230220-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2023-03-08_1035.doc
Resource
win10v2004-20230221-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
2023-03-08_1035.zip
-
Size
667KB
-
MD5
a82eaed8c2bbfb2e822262e3994ae184
-
SHA1
0627061a9f1d9cc8f50051d093a867a0d0a22aa7
-
SHA256
8c9068ba10a1e96dfbff0d53492dc251f0d203ff01eed75f7661a918cfff7d34
-
SHA512
894bdb796e868a4b64ded5b37a951a674674e55956604aa0d356bbc88b4c03a8b7c749a2292924a11d4ee6767db18a883da40aeb7a9845d6c795d27c4580c77b
-
SSDEEP
6144:wJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqx:UbPHom8TYyCT8x5I5wy
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/2023-03-08_1035.doc office_macro_on_action -
resource static1/unpack001/2023-03-08_1035.doc
Files
-
2023-03-08_1035.zip.zip
-
2023-03-08_1035.doc.doc windows office2003
ThisDocument
Module1