Behavioral task
behavioral1
Sample
DETAILS 14032023.doc
Resource
win7-20230220-en
windows7-x64
12 signatures
150 seconds
General
-
Target
DETAILS 14032023.zip
-
Size
721KB
-
MD5
069dd5459c5a0639461c4ee2649d5415
-
SHA1
2c434005f1cf47e55bcf4e0e9617d5a03ea7823f
-
SHA256
0742e51d1d636720c7623c0188b232a17a492f64ae38550ba9ec46b2b7f32a2b
-
SHA512
3075dcc823436d30f1cc6d237093da0b9b0bc1f9e79f7900b4d36619deceb754dcca03818c0e7e52854a972bb4dab5d73571bc293e00de6a930cdbfc9c48f266
-
SSDEEP
6144:8wZnDlMy6O3qKmCRUe1B5uLqcHfVDNUV3nJGM+BTT:PtDlb6IqXCRUe1BTcH8VIM+VT
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/DETAILS 14032023.doc office_macro_on_action -
Processes:
resource static1/unpack001/DETAILS 14032023.doc
Files
-
DETAILS 14032023.zip.zip
-
DETAILS 14032023.doc.doc windows office2003
ThisDocument
Module1