Behavioral task
behavioral1
Sample
W-9 03.07.2023.doc
Resource
win10-20230220-en
5 signatures
60 seconds
General
-
Target
4d6772bd0ed2ad824487b62ac531de53b15c450170db9654a2af69364c3b6031
-
Size
694KB
-
MD5
86ae09f539f0bf896d11076234ceb7f9
-
SHA1
c113c02099adc684817940924f8f9535dfa4b5cc
-
SHA256
4d6772bd0ed2ad824487b62ac531de53b15c450170db9654a2af69364c3b6031
-
SHA512
a3d2f5ad4b2387e9b7c3303385547033b6ffe872de89c6fee0f38eb1214273bf4c1a0989de41e387b127a71b665a47c46befd7a041ee1591e1b1a4f21c3ea59b
-
SSDEEP
6144:WJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqT:SbPHom8TYyCT8x5I5wY
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/W-9 03.07.2023.doc office_macro_on_action -
resource static1/unpack001/W-9 03.07.2023.doc
Files
-
4d6772bd0ed2ad824487b62ac531de53b15c450170db9654a2af69364c3b6031.zip
-
W-9 03.07.2023.doc.doc windows office2003
ThisDocument
Module1