Behavioral task
behavioral1
Sample
7efec3a8a5f23fe56fdc83ac8a4bfc418da4338e41852581ad22103d1eb9cb07.doc
Resource
win7-20230220-en
7 signatures
150 seconds
General
-
Target
10503469449.zip
-
Size
160KB
-
MD5
4b40509ee3aa71b521a7f12c4732e06c
-
SHA1
3a1506873389765e4785add9343636e60ec3b6a7
-
SHA256
913a60166a955181dacd43151c6925e0dc653f1e802fd1946d5b02df5939eb36
-
SHA512
855a0e04ce680ac1e6adc431e9a71cf79473e2c7f3c0290822de9122ce762758d479f0b429f5ae5dadc0f9c5a639b67006de1d36cd9cf15fd6af47770ad2ee4e
-
SSDEEP
3072:ep3P4alLJ/kcMcvZh0ZWFcJlj0NXW+6Zm2zdzLpJU/qQx8K019G8:ep/ZllpMcxhaMs2WPv5zLHLQx01w8
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/7efec3a8a5f23fe56fdc83ac8a4bfc418da4338e41852581ad22103d1eb9cb07 office_macro_on_action
Files
-
10503469449.zip.zip
Password: infected
-
7efec3a8a5f23fe56fdc83ac8a4bfc418da4338e41852581ad22103d1eb9cb07.doc windows office2003