Behavioral task
behavioral1
Sample
invoice_iex_admin_cleartext.doc1.docx
Resource
win7-20230220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
invoice_iex_admin_cleartext.doc1.docx
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
invoice_iex_admin_cleartext.doc1.docx
-
Size
53KB
-
MD5
1e047800a26b60cfe6807a24f20ca128
-
SHA1
0e03af9aea6c45591de6ba3b7d738b6ead7acb3e
-
SHA256
a10bf5feb936b7ddc7ffa53fde64841983322d1d80add86e5b4c89b224715a25
-
SHA512
4576b191e4e3856a891e116bf39108338d851df627fda7e691ac4cf71c711cac4ed48e456a6b22980ce5ba64531eb88ca8962482070922ebae047f5bc23ed624
-
SSDEEP
768:xPkbPJHHeTs/vTYyKYGUOWRKAon+KsNSHcAv3ir5nqDJJ:FkbPNegHThKj4TUc4SlqX
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
invoice_iex_admin_cleartext.doc1.docx.doc .ps1 windows office2003
ThisDocument
NewMacros