Behavioral task
behavioral1
Sample
W-9 03.07.2023.doc
Resource
win10-20230220-en
5 signatures
60 seconds
General
-
Target
e08c9cf334ca456237b961993e3a5bd89eaab0bcb37fbc6da3fcfdc640508b59
-
Size
685KB
-
MD5
dbbfe799260f939e31af796c0e9f054f
-
SHA1
4c1d8ea09c32bbdaa4c339243ad57de7f61b09ec
-
SHA256
e08c9cf334ca456237b961993e3a5bd89eaab0bcb37fbc6da3fcfdc640508b59
-
SHA512
bef02273f4e4df2d88c94b62ae20a5d8aecbaacaade619d0b2d7409d6ee84fe48e017a2cbaaf6bafa26b37a0d27def0ea9024717eb1eb8812976606b06d28554
-
SSDEEP
6144:aJNbwmfcuHom8Hz2f//ywiWT8xVTI5wq+:GbPHom8TYyCT8x5I5wT
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/W-9 03.07.2023.doc office_macro_on_action -
resource static1/unpack001/W-9 03.07.2023.doc
Files
-
e08c9cf334ca456237b961993e3a5bd89eaab0bcb37fbc6da3fcfdc640508b59.zip
-
W-9 03.07.2023.doc.doc windows office2003
ThisDocument
Module1