Behavioral task
behavioral1
Sample
2023-03-08_1026.doc
Resource
win10-20230220-ja
5 signatures
150 seconds
General
-
Target
Moon.odn.ne.zip
-
Size
656KB
-
MD5
59fa06f024ff44199eace8f7502e4e32
-
SHA1
092494e01f9daa644eef5f2fc25553af4bdd33bf
-
SHA256
5c91331970cffec23723601bfed9c57ead95bbf9e025557ccc52fd04fa86a277
-
SHA512
1c8f71a0303ef805edba3771ef9a7a74179c4b4346a83b19d7251f0a022e26023b0dc7e8e9e3bc144c4de3539cdd08ffec737c209102b27c5f988b6ee7685a42
-
SSDEEP
6144:bJNbwmfcuHom8Hz2f//ywiWT8xVTI5wq6:PbPHom8TYyCT8x5I5wh
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/2023-03-08_1026.doc office_macro_on_action -
Processes:
resource static1/unpack001/2023-03-08_1026.doc
Files
-
Moon.odn.ne.zip.zip
Password: infected
-
2023-03-08_1026.doc.doc windows office2003
ThisDocument
Module1