Behavioral task
behavioral1
Sample
bdc0b021dfb0c7afe6a5f8ce67c12078b0074b0fe3b3b13e1b3d1dfcf73b94a9.doc
Resource
win10-20230220-en
windows10-1703-x64
4 signatures
150 seconds
General
-
Target
10153565767.zip
-
Size
1.9MB
-
MD5
c95243ebb0a63bc86c5429540f23da46
-
SHA1
aaf278bc1e9cb5649c56d48d91e3aa859d7cfe5e
-
SHA256
51fb1c3947282934a5bfbd9009a59d33df2b0eb64a8808a95145e4769fac40c7
-
SHA512
9561c23ad9e66fd3a8b98f4dd52cfc25441007838efd35040e113411b51dd2f5f68529a20acc6d6fb6a720a24b0917643e185a24330e33dc9d8b46a2df75121e
-
SSDEEP
49152:jQZTzB+CM82mnuxHA5Tw/kf0GDJMGuugBaINRrFq+M8kM:EIy2mnmg5Tw/U0YKGE9NlFi8p
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/bdc0b021dfb0c7afe6a5f8ce67c12078b0074b0fe3b3b13e1b3d1dfcf73b94a9 office_macro_on_action -
resource static1/unpack001/bdc0b021dfb0c7afe6a5f8ce67c12078b0074b0fe3b3b13e1b3d1dfcf73b94a9
Files
-
10153565767.zip.zip
Password: infected
-
bdc0b021dfb0c7afe6a5f8ce67c12078b0074b0fe3b3b13e1b3d1dfcf73b94a9.doc windows office2003
ThisDocument
M0
M1
M2
F0
F1
F2
F3
C2
C3
M9