Behavioral task
behavioral1
Sample
Invoice N LPS494133 14 March.doc
Resource
win7-20230220-en
7 signatures
150 seconds
General
-
Target
Invoice N 64 14 March.zip
-
Size
676KB
-
MD5
f5c88a68924f164616072fa49a750849
-
SHA1
bdb464714aa789638421994d335ef24c64037fb5
-
SHA256
631c140a32fabbfd22804d2ccd37e715d55f41ee8b97010f981f7d4ce820aafa
-
SHA512
ffbee81a4d8b05dc9fb3349d18c8693312c40f97ade96ff5f02f7cb88ba04c910ade81a486f72665fc503eb4c0668f4d4764dbdab70df283ddab009e33f4830d
-
SSDEEP
3072:jIFb4Wmkqke+cEeqH9vH+i2s1Vj8JxuLVpMs75XLKZvx:jOykqk6Lw+i2s1Vjkxuxp/Qvx
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/Invoice N LPS494133 14 March.doc office_macro_on_action -
resource static1/unpack001/Invoice N LPS494133 14 March.doc
Files
-
Invoice N 64 14 March.zip.zip
-
Invoice N LPS494133 14 March.doc.doc windows office2003
ThisDocument
Module1