Behavioral task
behavioral1
Sample
INVOICE 589 03_23.doc
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
INVOICE 589 03_23.doc
Resource
win10v2004-20230220-en
11 signatures
150 seconds
General
-
Target
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip
-
Size
123KB
-
MD5
c865656907693448c87d7945beb24ff9
-
SHA1
2415e4fb12eddf08e2eba70a3c80e9c06574be39
-
SHA256
19f2f6e66164e6a20718910eab7334ff9734480f2bd9aec1d362c8b0928272d8
-
SHA512
c1cd9aaa1f808c2b993b37db36e9599c9fe51c7e27a32555bac79773288978c735b77bdb5b8853013865fb135c6f5e2e9bdb6d26d0559f9e87d162f19cea2cb5
-
SSDEEP
3072:wNKwNjWdf1uY5TAnVcQ82/7X7PGwuOmg54:w9RmP6J/Gg54
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack003/INVOICE 589 03_23.doc office_macro_on_action -
resource static1/unpack003/INVOICE 589 03_23.doc
Files
-
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip.zip
Password: infected
-
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip.zip
Password: infected
-
INVOICE N L96505 03_23.zip.zip
Password: infected
-
INVOICE 589 03_23.doc.doc windows office2003
ThisDocument
Module1