Behavioral task
behavioral1
Sample
DeliveryInformation.doc
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
DeliveryInformation.doc
Resource
win10v2004-20240226-en
11 signatures
150 seconds
General
-
Target
54aac0840808311e3ab47f76f8ea4b5639bcaac49e3bb4e3c4c6fd6240c21590
-
Size
1.0MB
-
MD5
eb6cf9da476c821f4871905547e6a2b4
-
SHA1
f13f0fbdbb653866307686f45c310532b50003aa
-
SHA256
54aac0840808311e3ab47f76f8ea4b5639bcaac49e3bb4e3c4c6fd6240c21590
-
SHA512
021a3e80108dece5c663a19c93fce0881642d5a650e9d61fb75f99dbb8e956b51eb1f98af6aec0ff883d2bf0081766686cd8bd519633cfe7ed6622dfc66dad77
-
SSDEEP
24576:NUpJnLWC4ReRN1+3f2HmX86+A88kblmaKFYDUcrknAbVja:yrLWC4mG+H0KA88UIa4YA0ja
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/DeliveryInformation.doc office_macro_on_action -
resource static1/unpack001/DeliveryInformation.doc
Files
-
54aac0840808311e3ab47f76f8ea4b5639bcaac49e3bb4e3c4c6fd6240c21590.rar
-
DeliveryInformation.doc.doc .eml office polyglot
ThisDocument