Behavioral task
behavioral1
Sample
gescanntes-Dokument.doc
Resource
win7-20230220-en
windows7-x64
13 signatures
150 seconds
General
-
Target
MDE_File_Sample_cf9e4c7534e0116cae7f8714e3284061ce058ff6.zip
-
Size
658KB
-
MD5
64255eb2063a52f65970fdf1cb0c85df
-
SHA1
00f06987ac2bf9a79138dbe0837d76afe63b5088
-
SHA256
4e943075967fb249b56a16f3f7c9d647e98d6d85af2b162aa623ee7fc33dc331
-
SHA512
85f718dda27ff9d89910aa9d2c19e695c9770e88e0f4144f9e2ab8022972767c788699d40a2f9b3f3142a3ca30f4beda2627e574ae4f6ddbc1cd46474160415b
-
SSDEEP
12288:PyXIqz8+7UpplLvc+sB/imDYQnpVglo08YprdZlA0LIhCHotWZ/j/IG0Do:q4m8fxvi/iGtMlLZi0THUM
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack002/gescanntes-Dokument.doc office_macro_on_action -
Processes:
resource static1/unpack002/gescanntes-Dokument.doc
Files
-
MDE_File_Sample_cf9e4c7534e0116cae7f8714e3284061ce058ff6.zip.zip
Password: infected
-
gescanntes-Dokument.zip.zip
Password: infected
-
gescanntes-Dokument.doc.doc windows office2003
ThisDocument
Module1