Behavioral task
behavioral1
Sample
INVOICE 589 03_23.doc
Resource
win7-20230220-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
INVOICE 589 03_23.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip
-
Size
123KB
-
MD5
2dd846a8c98e613941de5e36a29fdda2
-
SHA1
b82ca38f32d63f8ce4c31fb4e08cafcf8a02990e
-
SHA256
44db060be0aac19bfd695bfa8401c5032926934c686145c6972ed171d5de48fb
-
SHA512
a824a2f6a8b1677064058cc7e45b5ae303fea0f38f42ecee2936fae3ce2af86a595bf8386ad70e50bfe5e043b9c0a8249c344dd866d6a5cb3f6986fafdb6af57
-
SSDEEP
3072:4WYuUJYdDkG2bq9QGOMcrW664jIW5bY5DVx:1YuQY3HOMcrljxbY5H
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack003/INVOICE 589 03_23.doc office_macro_on_action -
resource static1/unpack003/INVOICE 589 03_23.doc
Files
-
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip.zip
Password: infected
-
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip.zip
Password: infected
-
INVOICE N L96505 03_23.zip.zip
Password: infected
-
INVOICE 589 03_23.doc.doc windows office2003
ThisDocument
Module1