Behavioral task
behavioral1
Sample
2023-03-10_1627.doc
Resource
win10v2004-20230221-en
windows10-2004-x64
5 signatures
30 seconds
General
-
Target
2023-03-10_1627.zip
-
Size
707KB
-
MD5
05db8f01f35f8756f5c9913e87054d1c
-
SHA1
71603eeeefa77ecc5e0ffb833fe4b80ac879b926
-
SHA256
93086cacfac52c95709ea1eb221c8cfd7fd7264139fb597c8e405d4ec41062fb
-
SHA512
a77a6ff93975a46ff45d89200bc873194a5f5ff16ccb29ebe0217846a4f41c1a669829d6ff0e59409a4b57b23987908460f084c5702aace8e3e4535ace3fb987
-
SSDEEP
3072:JTdhlKitY6gngARvVndTW9ZCPuJSDCKvjl1flV+crxAm40/yL/sEZGNKl/s:DhQOY6egwndgkPwSDCKFVj+mb/yFIs/s
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/2023-03-10_1627.doc office_macro_on_action -
Processes:
resource static1/unpack001/2023-03-10_1627.doc
Files
-
2023-03-10_1627.zip.zip
-
2023-03-10_1627.doc.doc windows office2003
ThisDocument
Module1