Behavioral task
behavioral1
Sample
INVOICE 589 03_23.doc
Resource
win7-20230220-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
INVOICE 589 03_23.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
51f1fdf15170d27b6c36e52407bc57e614400179e93fb406eb8e8d6a1d3ecfa7.zip
-
Size
124KB
-
MD5
2d4d6693ca9cacab861a63cacbfd8d20
-
SHA1
8bd0a5b91d253db7e1e2313c0ab44280bd4a609b
-
SHA256
748ec7754ce328e4b22e34eee3611cde2b51d77bd17c9fe22569e3efa19e151a
-
SHA512
0609d627fc27c7efae9662ea929922eff172b5e131a6dcc9f90680bb2f6d3f77ca63e4ce7d5bbb69d945681a3f4068207a9fc3e744f5e8200eead3fbd1ef53e6
-
SSDEEP
3072:P9t14ChKyaJC2UyLUFNPtiVpBKKFlzy5cJdiAf0odlomv5lz:J4CMC/dFF+/zJdimldFz
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack002/INVOICE 589 03_23.doc office_macro_on_action -
resource static1/unpack002/INVOICE 589 03_23.doc
Files
-
51f1fdf15170d27b6c36e52407bc57e614400179e93fb406eb8e8d6a1d3ecfa7.zip.zip
Password: infected
-
51f1fdf15170d27b6c36e52407bc57e614400179e93fb406eb8e8d6a1d3ecfa7.zip.zip
Password: infected
-
INVOICE 589 03_23.doc.doc windows office2003
ThisDocument
Module1