Behavioral task
behavioral1
Sample
form.doc
Resource
win7-20230220-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
form.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
form.zip
-
Size
763KB
-
MD5
0fd03cce596e7c904d7596f863a17606
-
SHA1
bc6e0464f6592bf8697dad31b47439260498a000
-
SHA256
a26710aa82733dff77167bcf0238483001ecad7ee9a8b727aa4328850e2b150a
-
SHA512
46d86a7e93d67eb7964c571c7f289bf5fdaeb35e5b99dbea1cf63a6ee66fb4ad2bce785e78e9eaa85a1b0b43de96bade9ae13d46c403e27b95e38e262d799669
-
SSDEEP
6144:vkjM/ZrZPtRQhpuTec+hFF1NGJsCCmIivTF2f8bKm6zBA7FjAvxtR9Nu:cMZr1YpblFHpCCmRBbKm6l02bbNu
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/form.doc office_macro_on_action -
Processes:
resource static1/unpack001/form.doc
Files
-
form.zip.zip
-
form.doc.doc .js windows office2003
ThisDocument
Module1