Behavioral task
behavioral1
Sample
K-1 Dt 03.07.2023.doc
Resource
win10-20230220-en
5 signatures
60 seconds
General
-
Target
f30d92f9d4cd66322fb9511f3be6873699fb734b95b386ab52e4969135fa13d9
-
Size
694KB
-
MD5
173f3ed3aa773e51ed34304475a2993f
-
SHA1
c8f800d1ddf89d60f0b13bd2a67ced2840303495
-
SHA256
f30d92f9d4cd66322fb9511f3be6873699fb734b95b386ab52e4969135fa13d9
-
SHA512
e8c7eab559fc51a5be75b7963c6c75347c83359582bfb614feea22f473dd7b15d3e619ea1293cdccca1682aad45e8b88a5c9aa8cd4c85234a5423436f860ad42
-
SSDEEP
6144:iJNbwmfcuHom8Hz2f//ywiWT8xVTI5wq/:ubPHom8TYyCT8x5I5wm
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/K-1 Dt 03.07.2023.doc office_macro_on_action -
resource static1/unpack001/K-1 Dt 03.07.2023.doc
Files
-
f30d92f9d4cd66322fb9511f3be6873699fb734b95b386ab52e4969135fa13d9.zip
-
K-1 Dt 03.07.2023.doc.doc windows office2003
ThisDocument
Module1