Behavioral task
behavioral1
Sample
Payment inquiry 14-03-2023_0958.doc
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Payment inquiry 14-03-2023_0958.doc
Resource
win10v2004-20230220-en
12 signatures
150 seconds
General
-
Target
Payment inquiry 14-03-2023_0958.zip.zip
-
Size
151KB
-
MD5
a7e5e132d1e68630d1df25339434f6c6
-
SHA1
ad86804eb75e433a94dd3d761201bd1b5e9acd43
-
SHA256
5c5b6ac4dbef08cde7197465425c78577b56181fb1eb6f0109d42183452b0d6a
-
SHA512
7a63e58ad2e6bf5ea220440e12972abb174453a7da18fd98b69b617af7365e0d78111f3075bd7183403b59ada603a054d96c80c6b5c3a01454fbddc07fcabf16
-
SSDEEP
3072:h++4ErQKRvGlRhf5c+zmpCcxrGlr8BCz5h7HIOALQfNGn8GpX:h+mQKRvEf5XmpCcVUr80z/o3LxX
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack002/Payment inquiry 14-03-2023_0958.doc office_macro_on_action -
resource static1/unpack002/Payment inquiry 14-03-2023_0958.doc
Files
-
Payment inquiry 14-03-2023_0958.zip.zip.zip
Password: infected
-
Payment inquiry 14-03-2023_0958.zip.zip
-
Payment inquiry 14-03-2023_0958.doc.doc windows office2003
ThisDocument
Module1