Behavioral task
behavioral1
Sample
invoce WK63649 08 03 2023.doc
Resource
win7-20230220-en
12 signatures
150 seconds
General
-
Target
invoce N 762 08 03 2023.zip
-
Size
695KB
-
MD5
bd4f251cc3858cd08f5cd5d96776d12c
-
SHA1
979784ea8411defeb3f7de27095d7ba7559a69e9
-
SHA256
cb777b31d4993dd6c24dcf90c9fe51170f9146139b693221466336685944bcd2
-
SHA512
068ddde3ee44516bc589485c68e02adfafe4faf8cc8a7c06380263cd6b667444187302f46d852e37d70228b548ac77d315cea9c70a1beb8fc9a486d2ffcac52a
-
SSDEEP
6144:QJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqr:0bPHom8TYyCT8x5I5wq
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/invoce WK63649 08 03 2023.doc office_macro_on_action -
resource static1/unpack001/invoce WK63649 08 03 2023.doc
Files
-
invoce N 762 08 03 2023.zip.zip
Password: infected
-
invoce WK63649 08 03 2023.doc.doc windows office2003
ThisDocument
Module1