Behavioral task
behavioral1
Sample
INVOICE 589 03_23.doc
Resource
win7-20230220-en
windows7-x64
11 signatures
150 seconds
General
-
Target
b4d9ac56942fb6ab57cc28b947c7d278.bin
-
Size
123KB
-
MD5
137f12537530e616a5256009ca217e88
-
SHA1
a3742c31bdb57530534b98c112de924f3ce29389
-
SHA256
65175173709587d0e291f7663dac866f0bbfcc06d706b63db74e17877f9373b3
-
SHA512
8c9b089407383c040b7ca76ae72d45d8c0973c2d183c1f3166e12abc4bdddadfc60406529f0a2d3701fb9148617cd1069bd4afcf87c55232c89f80c81466a321
-
SSDEEP
3072:MqNVZbYLIA5X7G6TPTHo3CkWfBLB6JzfBdMK3B8pxc:7RbzAJS6/HQ+B6J/MK32Pc
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack003/INVOICE 589 03_23.doc office_macro_on_action -
resource static1/unpack003/INVOICE 589 03_23.doc
Files
-
b4d9ac56942fb6ab57cc28b947c7d278.bin.zip
Password: infected
-
710709a200a5cda2a4293e9de521ab65d23170ab8bca04c8c7af22f86091d5d7.zip.zip
Password: infected
-
INVOICE N L96505 03_23.zip.zip
Password: infected
-
INVOICE 589 03_23.doc.doc windows office2003
ThisDocument
Module1