Behavioral task
behavioral1
Sample
invoce n 25871 09.03.2023.doc
Resource
win7-20230220-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
invoce n 25871 09.03.2023.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
invoce n NQ321 09.03.2023.zip
-
Size
723KB
-
MD5
fe79df47e0533bc77b23781e0d7d2a3a
-
SHA1
9d066280b296e29a1d4f9efb5076c3df755bcf13
-
SHA256
b47e21144ab84a5efc555045c308b242e6ff5c8834f1231f06d66f3779209bb0
-
SHA512
325e4e341e6613109d02753ae8e4186c381cf2d49f68695da8dc0264566499bb46552ff545edc8ed9a2ca424032fc540c97293058b8b0d9b99f0765206397272
-
SSDEEP
6144:l2OPYgKAapWp7q0CYcB906oP6FnpamsXp+YIDK/vj9xHsQUsXb/:BggCwZq0CvfS0np0om/vBxMBs7
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/invoce n 25871 09.03.2023.doc office_macro_on_action -
Processes:
resource static1/unpack001/invoce n 25871 09.03.2023.doc
Files
-
invoce n NQ321 09.03.2023.zip.zip
-
invoce n 25871 09.03.2023.doc.doc windows office2003
ThisDocument
Module1