Behavioral task
behavioral1
Sample
UrgentPayment.doc
Resource
win7-20230831-en
7 signatures
600 seconds
Behavioral task
behavioral2
Sample
UrgentPayment.doc
Resource
win10v2004-20230915-en
7 signatures
600 seconds
General
-
Target
Lure.zip
-
Size
18KB
-
MD5
142df7bc3b8b03cab8218f5b69f825e9
-
SHA1
a08c635b60b83f1e38470d6212e9f13ff86e7f45
-
SHA256
179845be78bf0845bdc8f8799c451cab3b8555b15000f23d0eae3409807dfa09
-
SHA512
ce584c25c1c47d500bd58be67ba9ee7776e4753128735ad9e3cdabe5ecc94e3a63a3ca92ad9298fa980e3730df4059bb55b5e727655c59026ba51fe11472c86d
-
SSDEEP
384:nHuYF4zML/helOUV8r3vM5Bj73UAd3zc7cfixPl7nIfSQ0:HhiC/h0DV8453UTw6xPhIa/
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/UrgentPayment.doc office_macro_on_action -
resource static1/unpack001/UrgentPayment.doc
Files
-
Lure.zip.zip
Password: hackthebox
-
UrgentPayment.doc.doc windows office2003
ThisDocument
Module1