Behavioral task
behavioral1
Sample
invoce No Q74 09.03.23.doc
Resource
win7-20230220-en
windows7-x64
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
invoce No Q74 09.03.23.doc
Resource
win10v2004-20230221-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
invoce N 74957 09.03.23.zip
-
Size
741KB
-
MD5
e63da6fc44a74b719651d00376dd1924
-
SHA1
17396db3f9656fb55e920b2e9504e43c5bd4e4df
-
SHA256
46af8107f62b4b31aac64d57e7436128defa4e840d87fe1624c570bac742d7ec
-
SHA512
b9a52bbaa0af3e66e55b0ab798c73fcc86bfae5bce36f7924a8194ae97e0158dddbc0fa6304fb2aac2def87dc16c2f387cee24fffba64ae6bab0c4188cb4f223
-
SSDEEP
6144:G2OPYgKAapWp7q0CYcB906oP6FnpamsXp+YIDK/vj9xHsQUsXbP:kggCwZq0CvfS0np0om/vBxMBsD
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/invoce No Q74 09.03.23.doc office_macro_on_action -
Processes:
resource static1/unpack001/invoce No Q74 09.03.23.doc
Files
-
invoce N 74957 09.03.23.zip.zip
-
invoce No Q74 09.03.23.doc.doc windows office2003
ThisDocument
Module1