Behavioral task
behavioral1
Sample
Arc_C5BJSH4JPPHL9E.doc
Resource
win7-20230220-en
4 signatures
60 seconds
Behavioral task
behavioral2
Sample
Arc_C5BJSH4JPPHL9E.doc
Resource
win10v2004-20230220-en
4 signatures
60 seconds
General
-
Target
2023-3-8-d7e33738ef7f2429a18c0c150bed57fc.bin
-
Size
683KB
-
MD5
d7e33738ef7f2429a18c0c150bed57fc
-
SHA1
838f094b189ab881a411f4d99eacb1fa9b32f5c0
-
SHA256
a12c694170956269af7084261791d85dbe3b5d6efb8732e2065eb1e3a42d2dd2
-
SHA512
f11744dc7d0b8a96f28a149f77a78c75c5876b2b120c76879f2b7c745cafedd20d1af876bb93a1adc0206f3fc51ea7f72b223942c8cdc695413f0dbc9e081f03
-
SSDEEP
6144:6JNbwmfcuHom8Hz2f//ywiWT8xVTI5wqt:mbPHom8TYyCT8x5I5wk
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/Arc_C5BJSH4JPPHL9E.doc office_macro_on_action -
resource static1/unpack001/Arc_C5BJSH4JPPHL9E.doc
Files
-
2023-3-8-d7e33738ef7f2429a18c0c150bed57fc.bin.zip
-
Arc_C5BJSH4JPPHL9E.doc.doc windows office2003
ThisDocument
Module1