Behavioral task
behavioral1
Sample
2023-03-08_1254.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023-03-08_1254.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
2023-03-08_1254.doc
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
2023-03-08_1254.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
email-html-1.html
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
email-html-1.html
Resource
win10v2004-20230220-en
General
-
Target
MIME-Version_ 1.0.eml
-
Size
921KB
-
MD5
19d025439ae6bb7e477d9a87f5bc40c0
-
SHA1
e4e89efdebc800dcd92f2000c50e42469ec62c3a
-
SHA256
89ec82c194a3d16c389111e704226514b01ee5f118e663612091b4d5ca59cc78
-
SHA512
6ee00bab4bd55e39e5216c0363d5033c188de6f9a7bc72472b9e21c936950644f27a0a4a45f25f515b1af78cc56fff168c1598d5bdcd31f8c6da2c90da72bc73
-
SSDEEP
6144:Y4XAGrJFHt4UO/2GLdurywP4cFEJbyqAuCLkKI7M:YqAGbiUO/2GLd1SFERyqnew7M
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack002/2023-03-08_1254.doc office_macro_on_action -
Processes:
resource static1/unpack002/2023-03-08_1254.doc
Files
-
MIME-Version_ 1.0.eml.eml
-
2023-03-08_1254.zip.zip
-
2023-03-08_1254.doc.doc windows office2003
ThisDocument
Module1
-
email-html-1.txt.html