Behavioral task
behavioral1
Sample
Mail_17032023.doc
Resource
win7-20230220-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
Mail_17032023.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
Mail_17032023.doc
-
Size
545.3MB
-
MD5
c81c9c01882f96abdcfa92ee9f31a3b1
-
SHA1
682ec88a99317a68027b9d6a68cfbf84a17606af
-
SHA256
406ffd16cec91bb6f53e27623c096a4a6bb060ff5ab52d45e6e6ae864dbcc8a3
-
SHA512
d3b4e663f8e7134825e6b9d27fc8dada8e470cb82e27cc04d4248c5d279261036c42281773814581671f33558833e1ecb2932d14dff5ba811e6111eb08d6b520
-
SSDEEP
6144:ip32/gDd0Nmt71wFmSWjfDrV8YQnZocbyrX4NqclWL9:ip32SEmtJwFmhjfPtrXqqyW
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
Mail_17032023.doc.doc windows office2003
ThisDocument
Module1