Behavioral task
behavioral1
Sample
7395339227609790__2023-08-03_1044.doc
Resource
win7-20230220-en
4 signatures
60 seconds
Behavioral task
behavioral2
Sample
7395339227609790__2023-08-03_1044.doc
Resource
win10v2004-20230221-en
4 signatures
60 seconds
General
-
Target
2023-3-8-f9b0fd6419339733779565f0a252e359.bin
-
Size
680KB
-
MD5
f9b0fd6419339733779565f0a252e359
-
SHA1
70f4e93ce00da95a13fd3233ec9f23a4f76c5a53
-
SHA256
a5fdbcc5858681d350b8f1fbd95811f6b80be76d1a403cc4e18d07e3fc810763
-
SHA512
26726ef00b3bada59808a2bdf43e70fa444709a2fa4b3fb6cdda7824df4d668d543ded67da60a65ecd9c6d857881c0d2023b6fb410d39ce7db3e6eed53d92f57
-
SSDEEP
6144:PJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqT:jbPHom8TYyCT8x5I5wu
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/7395339227609790__2023-08-03_1044.doc office_macro_on_action -
resource static1/unpack001/7395339227609790__2023-08-03_1044.doc
Files
-
2023-3-8-f9b0fd6419339733779565f0a252e359.bin.zip
-
7395339227609790__2023-08-03_1044.doc.doc windows office2003
ThisDocument
Module1