Behavioral task
behavioral1
Sample
10f05349c7ce400e47cdc81af2af7af285ba68a4a2930aeabc1589fe889751e9.docm
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
10f05349c7ce400e47cdc81af2af7af285ba68a4a2930aeabc1589fe889751e9.docm
Resource
win10v2004-20230703-en
General
-
Target
11185702811.zip
-
Size
34KB
-
MD5
d1670c77c0f14a5a926b6196a4b6b4f2
-
SHA1
0d20738cc55e1cd3990a98b2b09dfaf88ab8fa6b
-
SHA256
65035a931748eb2587e54075c67e7d6fc51629539b2e5c47f3d1139bbade4e25
-
SHA512
0571a37bf384f2ac5efe2d391d963efebe83bb12ee047d2d977922170ba8e662d809853b2197595393f53e42dd0f378b5f7176c295403c043353c5f4a33f09f1
-
SSDEEP
768:kfZ+m4xO2jZM1nY12/FKi8yalLun34d7AuEuYkOOZ3NXGF38:2+VVM1ng2/UI4aiOOZ838
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/10f05349c7ce400e47cdc81af2af7af285ba68a4a2930aeabc1589fe889751e9 office_macro_on_action -
resource static1/unpack001/10f05349c7ce400e47cdc81af2af7af285ba68a4a2930aeabc1589fe889751e9
Files
-
11185702811.zip.zip
Password: infected
-
10f05349c7ce400e47cdc81af2af7af285ba68a4a2930aeabc1589fe889751e9.docm office2007
ThisDocument