Behavioral task
behavioral1
Sample
PO00078520.doc
Resource
win7-20230220-en
5 signatures
150 seconds
General
-
Target
2a3b38b00c034163284032a5456d564cfd256677432371a5ff9735076b401620.zip
-
Size
665KB
-
MD5
78cd6dd5f21f83f43b4f22b8b1bc79d4
-
SHA1
b9f3001d7160b9a2f7014dcea18652f4607a4936
-
SHA256
2a3b38b00c034163284032a5456d564cfd256677432371a5ff9735076b401620
-
SHA512
af836cedb508feea91ed8cc173226d6ade822a5432b7d85a5075ecc91a8e1195c9cbc6a6cccbd8d869e9bb73e25ac9e151649d7b802e33d48db3685560b1bb76
-
SSDEEP
3072:/9KxsZJTw9U8wkt3d9Oi0jKXnacTBy1uhzhh8Q8TiqfMA2+DVfZx2ePQCOJEl:/93zn23Oi0uXnTZj+Q8TbfMAJ1xPQjJg
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/PO00078520.doc office_macro_on_action -
resource static1/unpack001/PO00078520.doc
Files
-
2a3b38b00c034163284032a5456d564cfd256677432371a5ff9735076b401620.zip.zip
-
PO00078520.doc.doc windows office2003
ThisDocument
Module1