Behavioral task
behavioral1
Sample
Message_1703.doc
Resource
win7-20230220-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
Message_1703.doc
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
Message_1703.zip
-
Size
700KB
-
MD5
0f478c736496e7b2ddf8770ee1a6e4cd
-
SHA1
440ca4bda539b1dd8df1e447cbb697f5c2fca560
-
SHA256
0706815585b882817440ccbff26fc71ff2752e9506cdef4b31e8d69a00f8a854
-
SHA512
76798edf9558629f61199c38cb007a46a035197b6c606d276a791d8a44a768052619827bf49a256d3657197f0011d915e2f63fc96625c21260a0d949934fe50e
-
SSDEEP
3072:0SgWiG5Z++yxJU4djtxx0SA0cEaEwj5hsXk6h4x3OOPi+RA5KYncoJMP:0SXvl4djtxx0ucEaHiXkllOU9o/AP
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/Message_1703.doc office_macro_on_action -
Processes:
resource static1/unpack001/Message_1703.doc
Files
-
Message_1703.zip.zip
-
Message_1703.doc.doc windows office2003
ThisDocument
Module1