Behavioral task
behavioral1
Sample
INVOICE VL18998 07 March 23.doc
Resource
win7-20230220-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
INVOICE VL18998 07 March 23.doc
Resource
win10v2004-20230220-en
11 signatures
150 seconds
General
-
Target
INVOICE VL18998 07 March 23.zip
-
Size
624KB
-
MD5
7863b25bd1f7a8cd331daf323885e269
-
SHA1
d61c53f3209e3e6275cdd79a971a1b07fae430c4
-
SHA256
e572afbae493b44f1f0268d8fe9cf8974693dafbc39627368d856c6bb826a882
-
SHA512
075778af56d26ca6b056c22ac3b7b63539e4acba882c791b7b15254dab5bc24ef9fc9cb171249d5ba947d2deeac544fff8afd4045035574b53b810c6f7c2360a
-
SSDEEP
3072:MdCPqlSK6VmQ/nMQnkn/g+UjDI2RnN1vZFSSOGJWBF3L:MdCPgbyVnXk/gdjDPZN1vZFVOOWBF3L
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/INVOICE VL18998 07 March 23.doc office_macro_on_action -
resource static1/unpack001/INVOICE VL18998 07 March 23.doc
Files
-
INVOICE VL18998 07 March 23.zip.zip
-
INVOICE VL18998 07 March 23.doc.doc windows office2003
ThisDocument
Module1