Behavioral task
behavioral1
Sample
172ef30c265f0e51e2073ac501e39e3e.doc
Resource
win7-20230220-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
172ef30c265f0e51e2073ac501e39e3e.doc
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
172ef30c265f0e51e2073ac501e39e3e.zip
-
Size
120KB
-
MD5
ee3b1717266fb24dd74303ff5605bea4
-
SHA1
162024fa2a6f8776dfd13e3980d11a32848aa227
-
SHA256
0d61e7e82eba9c8ddfce4c93ff972ad34c5048969bd7248091ae67d4acb7f82b
-
SHA512
97fe8bbb3ba9f5c965e30a926196354caf2a06ebe32a8c57ded99f14cd932916975bf1bf8fa8c24c63f026c3eb7053ed747056f22091fdcb18f30fcfca931c74
-
SSDEEP
3072:RBn5/Ubvf8oBsOx6UchWTcFnuffdhXnawgvdVJ:RBn5cbX86Lonuff/nNSdn
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/172ef30c265f0e51e2073ac501e39e3e office_macro_on_action
Files
-
172ef30c265f0e51e2073ac501e39e3e.zip.zip
Password: infected
-
172ef30c265f0e51e2073ac501e39e3e.doc windows office2003