Behavioral task
behavioral1
Sample
invoce 4699497 14 March.doc
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
invoce 4699497 14 March.doc
Resource
win10v2004-20230220-en
12 signatures
150 seconds
General
-
Target
invoce n LXXOY2861 14 March.zip
-
Size
689KB
-
MD5
383c8d81ea0004807b110314173faa87
-
SHA1
48fd1793f5f439be2376c5de9de31a662bd271bb
-
SHA256
98516ee2b4fb06fbb8381c25f667937cdaac526b7e63260bc0d2dfa5c5aa63fa
-
SHA512
218b55a69c6d741b7689e1a32c01702e8b97e4ffb52918a675fb6158a0c126a79deef94bcd26ec0319ea314ecf8f7c3e73f96518fc4b57d1e8b98fe32cda9261
-
SSDEEP
3072:BIFb4Wmkqke+cEeqH9vH+i2s1Vj8JxuLVpMs75XLKZvu:BOykqk6Lw+i2s1Vjkxuxp/Qvu
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/invoce 4699497 14 March.doc office_macro_on_action -
resource static1/unpack001/invoce 4699497 14 March.doc
Files
-
invoce n LXXOY2861 14 March.zip.zip
-
invoce 4699497 14 March.doc.doc windows office2003
ThisDocument
Module1