Behavioral task
behavioral1
Sample
Electronic form 03.09.2023.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
60 seconds
General
-
Target
Electronic form 03.09.2023.zip
-
Size
757KB
-
MD5
c9327f784504ed950ce96a293f75a2c7
-
SHA1
e3fa57c7ef8febfdee7869c62e8cd172dd09b24f
-
SHA256
7014c9f21b7cac747600b573f31a1e00f878ce07ef969810f219b244e1109bb2
-
SHA512
503befa20ccc2a46eefff7b87a53c9552a0e72c1c7bc91f9e3490068f712029f0e9218f2b08aaa1bbaea4f1a8b7d08f53b74912bd4f14773e9d7158356078098
-
SSDEEP
6144:OkjM/ZrZPtRQhpuTec+hFF1NGJsCCmIivTF2f8bKm6zBA7FjAvxtR9N9:lMZr1YpblFHpCCmRBbKm6l02bbN9
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/Electronic form 03.09.2023.doc office_macro_on_action -
Processes:
resource static1/unpack001/Electronic form 03.09.2023.doc
Files
-
Electronic form 03.09.2023.zip.zip
-
Electronic form 03.09.2023.doc.doc .js windows office2003
ThisDocument
Module1