Behavioral task
behavioral1
Sample
AC-June-9487.mpp
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
AC-June-9487.mpp
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
11062024_0158_10062024_AC-June-9487.zip
-
Size
35KB
-
MD5
6573c71f4fc77612da0e573fca9297c2
-
SHA1
10be849347d92b527cb894314eec7371431745c3
-
SHA256
71b27ec96b607177236b67f84984cf04d4343c2dd0e37f506d0ed59f419f29a6
-
SHA512
7a22701571328f631232782e33d1d522d9eb1dc26783602e896400f842f8527a89c9bc3f48e861c32842d7b765661834bf5b6a46639cce606742311b8df80fc2
-
SSDEEP
768:HqP7BoWTLoytSjXoyz9Hdh/z1yZJKE0zPX4NkzH2C+Q8C5:HOloaoyt279HHBKJ10z/zr2C+ZC5
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/AC-June-9487.mpp office_macro_on_action
Files
-
11062024_0158_10062024_AC-June-9487.zip.zip
Password: infected
-
AC-June-9487.mpp.mpp .doc windows office2003