Behavioral task
behavioral1
Sample
Invoice No 174 March 23.doc
Resource
win7-20230220-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
Invoice No 174 March 23.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
Invoice No 174 March 23.doc
-
Size
543.3MB
-
MD5
7eb84a7a3fb18a7551c1e1388842a397
-
SHA1
5ff9cde3b87283178b9936ee89340c7737b90cbc
-
SHA256
55a0bb97b9a14e5e0f32765f475aa5288731689ceef380ead22de9efde9dece4
-
SHA512
5811397517d7783c35709f89eb30a82ade4e1ef305f8fad8ec9829bb11f64e9565ebc50f6ef183b2b41882e2a1ef4518901a5e1097025461907dfa3d56a601c4
-
SSDEEP
6144:1620tqUx3Xu+7ZkRIDNGi9a0Va5UAClo:1620tqm3+I2ezcz5U3lo
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
Invoice No 174 March 23.doc.doc windows office2003
ThisDocument
Module1