Behavioral task
behavioral1
Sample
2023-03-09_1730.doc
Resource
win7-20230220-en
7 signatures
150 seconds
General
-
Target
2023-03-09_1730.zip
-
Size
706KB
-
MD5
d3dd609e63e5c4c6dae8fc15e62f2dbb
-
SHA1
417cf9121108d32b1f8311510933b17cebde7a8c
-
SHA256
767e4c92370829f8a2c165c27b7c9149e22c8833c05228096b5cec1847373854
-
SHA512
70900f0e1930ebfaefb24cb5314e77a784156cbac6793c46b28cb1e7f33aedd2fd6e40cec7ba0bd1b41d0036e933189c199b7375c4dd144335f81dd58807ba65
-
SSDEEP
3072:2iAfPs0tO6SniAhaT2fKCEpPMPGzcaefJxRVNlumDpTpx6m7rrInkvkfCGAa+NTh:1Af7Iv5424pUP8cLvprInzCjNj9
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/2023-03-09_1730.doc office_macro_on_action -
resource static1/unpack001/2023-03-09_1730.doc
Files
-
2023-03-09_1730.zip.zip
-
2023-03-09_1730.doc.doc windows office2003
ThisDocument
Module1