Behavioral task
behavioral1
Sample
2023-03-08_1225.doc
Resource
win7-20230220-en
windows7-x64
4 signatures
60 seconds
Behavioral task
behavioral2
Sample
2023-03-08_1225.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
60 seconds
General
-
Target
2023-3-8-212765a877b44d7a3be1f90a6aed233d.bin
-
Size
653KB
-
MD5
212765a877b44d7a3be1f90a6aed233d
-
SHA1
03d20d5e0525322fa1a1572f6bd3a26aad541b99
-
SHA256
959f08d9b733402bc7e03f33be0229c02b9d030be31255efe2a8fd5d0270a817
-
SHA512
408492ffcfcfeee6347eecea5872f5966b5ad1c20d3ad338e58d2f985a6f76643d80874da13f0d3a8da5c2d0ae1d9a2a37a0cd623828ec0adbd8d25d62be1d7d
-
SSDEEP
6144:vJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqL:DbPHom8TYyCT8x5I5wc
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/2023-03-08_1225.doc office_macro_on_action -
resource static1/unpack001/2023-03-08_1225.doc
Files
-
2023-3-8-212765a877b44d7a3be1f90a6aed233d.bin.zip
-
2023-03-08_1225.doc.doc windows office2003
ThisDocument
Module1