Behavioral task
behavioral1
Sample
2023-03-08_1254.doc
Resource
win7-20230220-en
windows7-x64
7 signatures
150 seconds
General
-
Target
test.msg
-
Size
698KB
-
MD5
313bf0e1e6363d75374bb81246e398dd
-
SHA1
e1d5831defd4d2da0bf6bf0a7757167afc2710e3
-
SHA256
cddb9e749edefbdc868a546d1e7dcab73ba704d3c759f085b532642fa2e42de3
-
SHA512
5492dec434a76714dc46bd33a0cb656c1e3184f4362051a341193826eb7318adb5403eea3626c2789367d21dda4b4cda454798fb72200edafbff2ca260ef979c
-
SSDEEP
6144:2UxeJNbwmfcuHom8Hz2f//ywiWT8xVTI5wq:fAbPHom8TYyCT8x5I5w
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack002/2023-03-08_1254.doc office_macro_on_action -
Processes:
resource static1/unpack002/2023-03-08_1254.doc
Files
-
test.msg.msg
-
2023-03-08_1254.zip.zip
-
2023-03-08_1254.doc.doc windows office2003
ThisDocument
Module1