Behavioral task
behavioral1
Sample
Invoice# 55452732.doc
Resource
win7-20230220-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Invoice# 55452732.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
Invoice# 55452732.zip
-
Size
692KB
-
MD5
ce33876dffa5f9614e29b7cdedcf7c51
-
SHA1
eae805a448629ee5a75e4c74caeb5c1d4573a1b5
-
SHA256
b32d779478ff4441b049ff17031d47616ac04d6998d6ea4c9a996da50a36737f
-
SHA512
607a163f4736ce215d673c6d2a335ce0f9fd0e743a19e96b01ecbd20d9df852242290d63cf49fbf01095a87db8c1b31cfd651067953371df3ebcf334f15d9e6f
-
SSDEEP
3072:hJPwOBqguhRok0EOsHYQLMTwyOy2w4OLWxKJ5SuNVWla30:PjTuh1OVQTy/LWq7Wlak
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/Invoice# 55452732.doc office_macro_on_action -
Processes:
resource static1/unpack001/Invoice# 55452732.doc
Files
-
Invoice# 55452732.zip.zip
-
Invoice# 55452732.doc.doc windows office2003
ThisDocument
Module1