Behavioral task
behavioral1
Sample
c39fa592dbff04b7ab23d76ee0d378d08caede7fbe959f8cdecdb3ab4fd21060.doc
Resource
win10-20230220-en
13 signatures
150 seconds
General
-
Target
10787607285.zip
-
Size
12KB
-
MD5
56cae2a98557d6be3955b7d0f9e7d7f7
-
SHA1
7424ae4b92ad3bcddd47bafb789c3506176003eb
-
SHA256
b006db8e6a93984e952ab6e79adaef5f00ba33bf5e3f55a532c4a58a207666f1
-
SHA512
03bb57f79cbc515cbc7ea3bb234c5d17c521ae4e507aec26acd3fe245a8cdca97baad91a8aecef0b2008e7df9666f973495791917a6186368d52663d3f16736f
-
SSDEEP
384:NPzrRZUKwijE88QGH8MpjkhZ2i65WCyt98X79cAj:NPv79j4QGcIjkhZ2i65WTt9WRcAj
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/c39fa592dbff04b7ab23d76ee0d378d08caede7fbe959f8cdecdb3ab4fd21060 office_macro_on_action -
resource static1/unpack001/c39fa592dbff04b7ab23d76ee0d378d08caede7fbe959f8cdecdb3ab4fd21060
Files
-
10787607285.zip.zip
Password: infected
-
c39fa592dbff04b7ab23d76ee0d378d08caede7fbe959f8cdecdb3ab4fd21060.doc windows office2003
ThisDocument
NewMacros