Behavioral task
behavioral1
Sample
INVOICE 589 03_23.doc
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
INVOICE 589 03_23.doc
Resource
win10v2004-20230220-en
11 signatures
150 seconds
General
-
Target
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip
-
Size
123KB
-
MD5
325ac442c68769f14870ea757e767139
-
SHA1
5aacd77f04f81783cab8e95c7888404dbc8b4ac1
-
SHA256
b3cbb51c063e9ff2c6a45c211b95592b78eb858359c40c8c5fa49b7fd352b44f
-
SHA512
12529ca7bfeadf9b4ed8cbd58cb0ef5a093a0efdd5b938a9bd66398c6b96e2c02431b86c5345bc4734bb0d8e6cb03dc96b541e2a2a823848f0e54d28f299c8ce
-
SSDEEP
3072:G73Y/zrEZC5jGqnYwcyF2KQ4DlIX+KWrK0Iw:G73ezQeyNwcKNDlIdk/
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack003/INVOICE 589 03_23.doc office_macro_on_action -
resource static1/unpack003/INVOICE 589 03_23.doc
Files
-
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip.zip
Password: infected
-
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip.zip
Password: infected
-
INVOICE N L96505 03_23.zip.zip
Password: infected
-
INVOICE 589 03_23.doc.doc windows office2003
ThisDocument
Module1