Behavioral task
behavioral1
Sample
INVOICE 589 03_23.doc
Resource
win7-20230220-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
INVOICE 589 03_23.doc
Resource
win10v2004-20230220-en
11 signatures
150 seconds
General
-
Target
51f1fdf15170d27b6c36e52407bc57e614400179e93fb406eb8e8d6a1d3ecfa7.zip
-
Size
124KB
-
MD5
eaa960e4c89624f07efbc7e2353c0ab7
-
SHA1
91d7d39e70e0e919b3824df82d69a3ae0342a24b
-
SHA256
24e60ed09cbe38a2de13df4924ac362050fd5c408bffcd87cbafc74b440e831a
-
SHA512
5d43c4aad9ba1ae5052d76bc2c42a26910459f6842041cfabb6158db404b0f29e93912d4f984779ac425b3927da44a5f9e7886f594d8f5a37f77b109637511eb
-
SSDEEP
3072:2bi8HWekK9KpHY9/R+NLgtcFyx+3hY1VFa7VV7M:CiyPk46Y9R8LlMx+IiFM
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack002/INVOICE 589 03_23.doc office_macro_on_action -
resource static1/unpack002/INVOICE 589 03_23.doc
Files
-
51f1fdf15170d27b6c36e52407bc57e614400179e93fb406eb8e8d6a1d3ecfa7.zip.zip
Password: infected
-
51f1fdf15170d27b6c36e52407bc57e614400179e93fb406eb8e8d6a1d3ecfa7.zip.zip
Password: infected
-
INVOICE 589 03_23.doc.doc windows office2003
ThisDocument
Module1