Behavioral task
behavioral1
Sample
G-1048.doc
Resource
win7-20230220-en
windows7-x64
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
G-1048.doc
Resource
win10v2004-20230221-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
G-1048.zip
-
Size
690KB
-
MD5
fb7ab7c0e8b1e26ff91caefa5ae325c2
-
SHA1
c558312541e41234288add20e5504ca841a5eff9
-
SHA256
c57e4f1caa8ded8ba4e2277b812684580114314fcf19c20b1dc8eee9bc76642e
-
SHA512
05adce494a3de6cc52cb07d6cd6dd8ac157e5e3bbc6722b15d526ab14f1f4af1e782f954bf42bf3102fda1beeebccf97823f2a512428a53cc42b2d30593e74ac
-
SSDEEP
3072:4SgWiG5Z++yxJU4djtxx0SA0cEaEwj5hsXk6h4x3OOPi+RA5KYncoJMJ:4SXvl4djtxx0ucEaHiXkllOU9o/AJ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/G-1048.doc office_macro_on_action -
Processes:
resource static1/unpack001/G-1048.doc
Files
-
G-1048.zip.zip
-
G-1048.doc.doc windows office2003
ThisDocument
Module1