Behavioral task
behavioral1
Sample
invoce No LVBEC039675 March 23.doc
Resource
win7-20230220-en
11 signatures
150 seconds
General
-
Target
invoce No 28 March 23.zip
-
Size
658KB
-
MD5
781d54cb990d0ec027ac6055cc2d785b
-
SHA1
0cff383d7a80b8f0e9dba718a8aaaec8b4316034
-
SHA256
66cb9675f13a193ec36d09639125c3e1d55e655ea75a5a70464b7ebff2b9bd0c
-
SHA512
587bfaf34517a139e7cefdad8db5e14b4ff5562b302995642bd276504161ac1216ddab63537a1340daba6401551b9f50913f38eae6c4072115205eec7bfe21da
-
SSDEEP
3072:f9KxsZJTw9U8wkt3d9Oi0jKXnacTBy1uhzhh8Q8TiqfMA2+DVfZx2ePQCOJEu:f93zn23Oi0uXnTZj+Q8TbfMAJ1xPQjJt
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/invoce No LVBEC039675 March 23.doc office_macro_on_action -
resource static1/unpack001/invoce No LVBEC039675 March 23.doc
Files
-
invoce No 28 March 23.zip.zip
-
invoce No LVBEC039675 March 23.doc.doc windows office2003
ThisDocument
Module1