Behavioral task
behavioral1
Sample
PACK_17032023.doc
Resource
win7-20230220-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
PACK_17032023.doc
Resource
win10v2004-20230221-en
12 signatures
150 seconds
General
-
Target
PACK_17032023.zip
-
Size
676KB
-
MD5
96d7007beae33b451f115bc83e3e8072
-
SHA1
bf3642a5bcf10b2b8400030545dd710d752d67cc
-
SHA256
9a012846e85b90d5dba013d6dd607f5cd6e4d074b4316bc6c7b230fdf342786c
-
SHA512
397acdd07c3af72458923735619a0b4b7bad9e06bda2eafa05f87e78a240e2fc9fa46536e1e95fc629ec14ab92d0110159889e44695b588244a0a9145099a146
-
SSDEEP
6144:+P/mYiuwND6sXVrg561q/bqdjn4qwZwBk:8MhtV8Q1q/bCr4qwZok
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/PACK_17032023.doc office_macro_on_action -
Processes:
resource static1/unpack001/PACK_17032023.doc
Files
-
PACK_17032023.zip.zip
-
PACK_17032023.doc.doc windows office2003
ThisDocument
Module1