Behavioral task
behavioral1
Sample
2023-03-09_1317.doc
Resource
win7-20230220-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
2023-03-09_1317.doc
Resource
win10v2004-20230220-en
11 signatures
150 seconds
General
-
Target
2023-03-09_1317.zip
-
Size
679KB
-
MD5
7b81080d4482a1bb4731ee3e16c1a045
-
SHA1
515a5d1776529f325406f2853186105cc398df88
-
SHA256
83164c4a724305b131bf9297c5d2c0b85666f5571189bbb2aca9a202e1044d60
-
SHA512
e8d98e933b70451eefb0b0a1954c63485d57ab2a4e7d6f4b118b203cdfe7b2022fbe536048203d823ffefb7fee7850309135a0fe9103392d039415369c8183ca
-
SSDEEP
3072:a9KxsZJTw9U8wkt3d9Oi0jKXnacTBy1uhzhh8Q8TiqfMA2+DVfZx2ePQCOJER:a93zn23Oi0uXnTZj+Q8TbfMAJ1xPQjJ+
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/2023-03-09_1317.doc office_macro_on_action -
resource static1/unpack001/2023-03-09_1317.doc
Files
-
2023-03-09_1317.zip.zip
-
2023-03-09_1317.doc.doc windows office2003
ThisDocument
Module1