Behavioral task
behavioral1
Sample
payment.doc
Resource
win7-20230220-en
windows7-x64
12 signatures
150 seconds
General
-
Target
payment.zip
-
Size
707KB
-
MD5
e607f8754ebe696ff5037517dd6f7ee7
-
SHA1
bbde3f3c1f57077801e336d57d70b9b0ac9d9d96
-
SHA256
746aec8fa2532926c62ead1f37431538f14c12da17c8fe5f3467ea2f529a7ea8
-
SHA512
504055b62a8da862eb418e8d380e56966da9572882869439523611accd5c65148953516cee13d7b2b7db1e5e230188ed5dc57c9a5645c368edc1e8d11475848c
-
SSDEEP
3072:bjkdNNlBl3tTPyn/fIvTr+/LTSTHoXuS3Xw8uAnuA3rogT9/N:vkd/l3DvTKTsHkdtuAswN
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/payment.doc office_macro_on_action -
resource static1/unpack001/payment.doc
Files
-
payment.zip.zip
-
payment.doc.doc windows office2003
ThisDocument
Module1