Behavioral task
behavioral1
Sample
97e5ee3b35bbcf1c7e06535f735c5a536cb471998468a624f266cb92de159d65.doc
Resource
win7-20230220-en
7 signatures
150 seconds
General
-
Target
10783906474.zip
-
Size
1.0MB
-
MD5
36e6a63894485ebb39a3250cd6f7c75c
-
SHA1
7ed1e74ce26348c318f790d7423d4efb9951c554
-
SHA256
b6a875a60dc88ea9a907fb993079c401832f7549fb3dc2783aa635b4a4303678
-
SHA512
a857ca817d87a97d4ee1149e9ab52b19fb8919310e39cdfd15f218baf859093152b87cd9c781e83b26af517e9704268e7ea504f9c105eb8a9144efb44351c0ca
-
SSDEEP
24576:haOc+1nk7JMNPsUpsR9m8Saf9n1g0+ZGzo9MKWj9vxIqQ6:UOcck7JMN129BTg32vi56
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/97e5ee3b35bbcf1c7e06535f735c5a536cb471998468a624f266cb92de159d65 office_macro_on_action -
resource static1/unpack001/97e5ee3b35bbcf1c7e06535f735c5a536cb471998468a624f266cb92de159d65
Files
-
10783906474.zip.zip
Password: infected
-
97e5ee3b35bbcf1c7e06535f735c5a536cb471998468a624f266cb92de159d65.doc windows office2003
main
oAppClass
Module1