Behavioral task
behavioral1
Sample
SPIDER.doc
Resource
win7-20230831-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
SPIDER.doc
Resource
win10v2004-20230915-en
9 signatures
150 seconds
General
-
Target
SPIDER.doc.zip
-
Size
20KB
-
MD5
360ac49021a600ec36026a11598a94ce
-
SHA1
043e12cc7d38d474e9c9d2604606a1bb3659372a
-
SHA256
571b833b08bd96a56997bb3819ca0eda24eb1d0a21c42a545a9acd548a5acd63
-
SHA512
f13ec4a8e5f00f510e284d0d937570a0a260e3d3f0567e2fefdd9d6ab685311f3c1ea1e558069d35cffaa33408e7c5f048bd12cbe8848382cfc9737053e5d572
-
SSDEEP
384:YBYD74lxFXZCqIwjx11TzaGqRQjdTNcdoibmSKSlBx7cDPSh:oPZCqIwV11TK+lNwvIPSh
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/SPIDER.doc office_macro_on_action -
resource static1/unpack001/SPIDER.doc
Files
-
SPIDER.doc.zip.zip
Password: infected
-
SPIDER.doc.doc windows office2003
ThisDocument