Behavioral task
behavioral1
Sample
Invoice 09-03-2023_0730.doc
Resource
win7-20230220-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
Invoice 09-03-2023_0730.doc
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
Invoice 09-03-2023_0730.zip
-
Size
703KB
-
MD5
385920ad96d659eb1fe48de70db3ff32
-
SHA1
d153a39adc26712c05bc300fc1ab87aa3019dddb
-
SHA256
6f62f9d6c604ce9efaab3108000f00df9daea6afa8307a7aa9448a4ff01b8096
-
SHA512
456d0d8e028c8455bd7949c3483794d76886c6fcff08cef8b1ccd2609deba752b32f47efddbecc309f386327e1137e74ddda15df610c102db0403ce9420720be
-
SSDEEP
3072:miAfPs0tO6SniAhaT2fKCEpPMPGzcaefJxRVNlumDpTpx6m7rrInkvkfCGAa+NTI:FAf7Iv5424pUP8cLvprInzCjNjk
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/Invoice 09-03-2023_0730.doc office_macro_on_action -
resource static1/unpack001/Invoice 09-03-2023_0730.doc
Files
-
Invoice 09-03-2023_0730.zip.zip
-
Invoice 09-03-2023_0730.doc.doc windows office2003
ThisDocument
Module1