Behavioral task
behavioral1
Sample
Invoice# 5140312 23-03-2023_0714.doc
Resource
win7-20230220-en
11 signatures
150 seconds
General
-
Target
Invoice# 5140312 23-03-2023_0714.zip
-
Size
651KB
-
MD5
f98cba3dfe391856a9b57c23542a4e70
-
SHA1
11c35bfd004ce7c5e4dcbd6f2541da92b36fde39
-
SHA256
f4fa53f4e973fc4d098cc5cca5ab550661d0b4018aadf1119a476c8597e5370f
-
SHA512
f365cb2aaef37d2d9c4bc453acfb50e93e6644f9f07f79973ab9e1abaecb70f3a4d89287e6d6ac87a38584fe685d2f13387c322f351a2a6a96d1e8719b4349d6
-
SSDEEP
3072:hcJ4Y7C2UYBbenRoTwWAvuN9nyEeTHuhluAQ/RrrLZNQxBlGT40FO:uSgC2U4QRfr4nyEsHu7u3rrglb0k
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule static1/unpack001/Invoice# 5140312 23-03-2023_0714.doc office_macro_on_action -
Processes:
resource static1/unpack001/Invoice# 5140312 23-03-2023_0714.doc
Files
-
Invoice# 5140312 23-03-2023_0714.zip.zip
-
Invoice# 5140312 23-03-2023_0714.doc.doc windows office2003
ThisDocument
Module1