Resubmissions
16-03-2023 02:21
230316-ctfmhsge33 10Behavioral task
behavioral1
Sample
2023-03-08_1025.doc
Resource
win7-20230220-en
windows7-x64
7 signatures
150 seconds
General
-
Target
2023-03-08_1025.zip
-
Size
687KB
-
MD5
f6d50249f01143995c778ae549643704
-
SHA1
fcb9f4d23a083e69c0b6ac8c22a9009d2542a448
-
SHA256
61e39d6315924cf6e7bd41cdc6b81cc815ad0ef9f6d86f515c43b8f6b35211a4
-
SHA512
05016131d06649c9d0e99c262112592136bcd7d749efa65c345dae0727dcdd40dc5d7e6eb3cb33b25abb5d8b60b5775bf3b4984f4c759eaa6746a00358350f3e
-
SSDEEP
6144:GJNbwmfcuHom8Hz2f//ywiWT8xVTI5wqB:ibPHom8TYyCT8x5I5wm
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/2023-03-08_1025.doc office_macro_on_action -
Processes:
resource static1/unpack001/2023-03-08_1025.doc
Files
-
2023-03-08_1025.zip.zip
-
2023-03-08_1025.doc.doc windows office2003
ThisDocument
Module1