Behavioral task
behavioral1
Sample
info-1403.doc
Resource
win7-20230220-en
windows7-x64
12 signatures
150 seconds
General
-
Target
info-1403.zip
-
Size
738KB
-
MD5
f544f5f6d386f786941aac47ab3b6f3c
-
SHA1
a0a1053d799664446980e7589da57ffddc646d7c
-
SHA256
3bcec266f82b69bb6234bb5c7f267dea5d10b6c59e6736fb2b310cd978cd5519
-
SHA512
fc9855ab983a5815ecdd677940edc3bf319ad30a3d94eab9e513335c185b1bd2e0d23aebbc615cc26cd1e08f94342a3a8b31cda7a2bfcc3c6f0c4abe67fa92a9
-
SSDEEP
6144:/wZnDlMy6O3qKmCRUe1B5uLqcHfVDNUV3nJGM+BTR:otDlb6IqXCRUe1BTcH8VIM+VR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/info-1403.doc office_macro_on_action -
Processes:
resource static1/unpack001/info-1403.doc
Files
-
info-1403.zip.zip
-
info-1403.doc.doc windows office2003
ThisDocument
Module1