Behavioral task
behavioral1
Sample
MAIL_1703.doc
Resource
win7-20230220-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
MAIL_1703.doc
Resource
win10v2004-20230220-en
12 signatures
150 seconds
General
-
Target
MAIL_1703.zip
-
Size
695KB
-
MD5
a2b24848b47e984a5e0e530296685eae
-
SHA1
5cf6294247db87fd54e7c85ffecf1e2cad9c4a9c
-
SHA256
5ff0fc781791b6905225bfdad9815093b961821ead75b0f9753f48524adb608d
-
SHA512
df4117d83c5b0e4a2399b6506a6c874f8e57f7a69f7d431449b03b579218837de43fb44ed54d1105a4821c42d38dc8237b2c6132c5783329c6ba6fb8160f466f
-
SSDEEP
3072:8SgWiG5Z++yxJU4djtxx0SA0cEaEwj5hsXk6h4x3OOPi+RA5KYncoJMZ:8SXvl4djtxx0ucEaHiXkllOU9o/AZ
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/MAIL_1703.doc office_macro_on_action -
resource static1/unpack001/MAIL_1703.doc
Files
-
MAIL_1703.zip.zip
-
MAIL_1703.doc.doc windows office2003
ThisDocument
Module1