Behavioral task
behavioral1
Sample
INVOICE 589 03_23.doc
Resource
win7-20230220-en
6 signatures
150 seconds
General
-
Target
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip
-
Size
123KB
-
MD5
3cbed227f1ab1a94b08bd62c6b904b9b
-
SHA1
c0f80240681fdd8cd3e47cd1364c1f0ec4c13ca4
-
SHA256
699e7643cdf1a74adcd25a87ee9ffdc5f81f6246fbe3bbdc1404d0afdca8d0fb
-
SHA512
256bac1137692f208a3a154d28f5d2685d93f7c91cf2540e2215415ba28a5f705c46103b9d73e405b7d8b0c8bf03b231ee972ea5fbd06c2418844d2321aecd5d
-
SSDEEP
3072:8ViyowYd7ZtI3G+V7Q/ztOxNHufvdLEGjRu6G0f:eiyopttI3XV7QLMkvhEX6/f
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack003/INVOICE 589 03_23.doc office_macro_on_action -
resource static1/unpack003/INVOICE 589 03_23.doc
Files
-
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip.zip
Password: infected
-
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip.zip
Password: infected
-
INVOICE N L96505 03_23.zip.zip
Password: infected
-
INVOICE 589 03_23.doc.doc windows office2003
ThisDocument
Module1