Behavioral task
behavioral1
Sample
7ddb1310fe963209571089f1b2df587a78b342e9c2f77b4770274ed567ad543a.doc
Resource
win7-20230220-en
5 signatures
150 seconds
General
-
Target
10840246227.zip
-
Size
1.7MB
-
MD5
3bff80ecb67257cab5bbbc68071328fd
-
SHA1
0b82f4a5a7e3404fa7e76a8eeb3ad82cd9cbfa6f
-
SHA256
ff2d241d3f89a9a979c6988fb44ef8300a1e0dfa9a77ef806a7abce41774821d
-
SHA512
a30bdf6b10080ee55bcf6859be86bbbc7913751792549465638d2b1b3b3f7b869ebf4fb6f92e342ff0efcfc808a8c56cc53dd637b78202c7b11c1b06b7ad564e
-
SSDEEP
49152:rLrTu5NYG7Y+pqt8I2YVuW+JGcuV5eZT95sb:vrTufYKY+pqt8IpuWcR/T9C
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/7ddb1310fe963209571089f1b2df587a78b342e9c2f77b4770274ed567ad543a office_macro_on_action -
resource static1/unpack001/7ddb1310fe963209571089f1b2df587a78b342e9c2f77b4770274ed567ad543a
Files
-
10840246227.zip.zip
Password: infected
-
7ddb1310fe963209571089f1b2df587a78b342e9c2f77b4770274ed567ad543a.doc windows office2003
ThisDocument
Main
Correspondence
MessageStatement3a
UserForm0
ADUserForm1
ADUserForm4
ADUserForm5
GUserForm1620
CLetters
QLetters
PUserForm1
PUserForm2
MessageStatement2a
KLetters
ADUserForm16
GUserForm1120
GUserForm1110
ADUserForm2
DLetters
GLetters
PLetters