Behavioral task
behavioral1
Sample
C & C Installation Services.doc
Resource
win10-20230220-en
5 signatures
60 seconds
General
-
Target
3fccb0bd368117f2dedbf944e93a4c3f3da652c08e2c90ee83880cc3f862545e
-
Size
657KB
-
MD5
ae79c95d748271711c475e99da264c3c
-
SHA1
d4562da846279589a8d77fb28a6f245dc66dc478
-
SHA256
3fccb0bd368117f2dedbf944e93a4c3f3da652c08e2c90ee83880cc3f862545e
-
SHA512
98c7982d2b95f1ae4ed441f0bc4f8221700c7844ac4989d0cec27341bbdbb262f8a2cb4c82cf4d81511e82f683303c988434adc7d1b85ddbb8d1d45b367ce097
-
SSDEEP
6144:LJNbwmfcuHom8Hz2f//ywiWT8xVTI5wq0:fbPHom8TYyCT8x5I5wZ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/C & C Installation Services.doc office_macro_on_action -
resource static1/unpack001/C & C Installation Services.doc
Files
-
3fccb0bd368117f2dedbf944e93a4c3f3da652c08e2c90ee83880cc3f862545e.zip
-
C & C Installation Services.doc.doc windows office2003
ThisDocument
Module1