Behavioral task
behavioral1
Sample
10cf9a0991242d79eeafee99d39c8349b37413a436b0e635208f41444376bd48.docx
Resource
win10v2004-20230915-es
4 signatures
150 seconds
General
-
Target
10cf9a0991242d79eeafee99d39c8349b37413a436b0e635208f41444376bd48.zip
-
Size
816KB
-
MD5
2be82b0f300e1af306ff5cf5e29cbefb
-
SHA1
9eb4d0667dac34dd6fe7b4d529df30676dfee89c
-
SHA256
e573255f6044aef906edf6ce6723ab896b8840e4d19ef006af8f03b3340da568
-
SHA512
4d69a60e70f20d201aff84ca03c94a4f409658cb9c8c1b822f7a0f94087bcc36405b3075adb2c259f7e1a9643d62a544c02504f97ee6c06f4c5b12469578709c
-
SSDEEP
24576:Fg9TVTf+C6n6nIbDex7UtaZZkkrFDW3jkHj:F6TVD+C6naIbDytNrFi3jkD
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/10cf9a0991242d79eeafee99d39c8349b37413a436b0e635208f41444376bd48.docx office_macro_on_action -
resource static1/unpack001/10cf9a0991242d79eeafee99d39c8349b37413a436b0e635208f41444376bd48.docx
Files
-
10cf9a0991242d79eeafee99d39c8349b37413a436b0e635208f41444376bd48.zip.zip
Password: infected
-
10cf9a0991242d79eeafee99d39c8349b37413a436b0e635208f41444376bd48.docx.doc .docx windows office2003
ThisDocument
Módulo1