Behavioral task
behavioral1
Sample
Invoice No 526807 March 23.doc
Resource
win7-20230220-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
Invoice No 526807 March 23.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
Invoice No 526807 March 23.doc
-
Size
517.3MB
-
MD5
bcae0aca1a3b2df9d5e85de2ed3666e9
-
SHA1
f56c3b72b7e8c55b9685e35765553fafbbb08e2b
-
SHA256
5a092b0034f937f68ad7e5679ed840039fb824df8cad8f74b890cb7f4e42f0cd
-
SHA512
4162200952e62402a6085ae5f1342a5b35d59f52a5ddf54d9eea3d318f62df9ca308cfc3e079cca484ab38af1ed17fa68fe9ad0c9541ff483aa3de20fff44afa
-
SSDEEP
6144:xPn4VZXbatu7MDogsDkHS50LdfcGcbz1f5M9KTFrMpSlMK3Ru+Q28:xP4PbNMkgg3Ru+x
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
Invoice No 526807 March 23.doc.doc windows office2003
ThisDocument
Module1