Behavioral task
behavioral1
Sample
INVOICE 2023-03-08_1135, United States.doc
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
INVOICE 2023-03-08_1135, United States.doc
Resource
win10v2004-20230220-en
12 signatures
150 seconds
General
-
Target
INVOICE 2023-03-08_1135, United States.doc
-
Size
541.3MB
-
MD5
602c25f1414256a470869bc140455904
-
SHA1
3ce701d14143dd5f2f52427bfba369b2f643f1e2
-
SHA256
6e1d192b59f1320cc66cce1a87c496bd3ea7d3d10158782d39fb00a93b260bcd
-
SHA512
6fd9c23c700a5d539171c6c3cd9afd6fd9e7c2eab12257501266eb90c727d5d42e43cc84c0806e452b239945ec4ebd1d3bba3865c49145ff93011a5f63f8ccdf
-
SSDEEP
3072:2JX29m8QBUoItA/leC6gSJ+2JiclnUOvrRxqmLcHeNJxPkdVdTRcDK6:2EmleC6gSJWclU0RxVLcHe5cdTR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
INVOICE 2023-03-08_1135, United States.doc.doc windows office2003
ThisDocument
Module1