Behavioral task
behavioral1
Sample
AC-June-9137.mpp
Resource
win7-20240508-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
AC-June-9137.mpp
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
sparrow.zip
-
Size
37KB
-
MD5
b5b11e5fc6ffd25dac41cc4dcb13dee2
-
SHA1
0c02955b1ecea239104ea7d1f9c54922d36901dd
-
SHA256
042eb175bd25db6a6c54dbb66480f424c825bb5bc0d25fa53369c2f64df46b5c
-
SHA512
4b04b6cbfbfe340f3ef54ab0bb2ded290dbf3899bb86dca2cca629f543b314ac6ad4f9f08f5afae6f9265e0437d6246cc89d66a5395a04f995c091500956d738
-
SSDEEP
768:5xZt7Sr6KCG3ci9+vhZWr2ueZbdfcWhA+JRQU1tso6xh+B:fWryG3ci9+pZWrjeZb3P1tR
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/AC-June-9137.mpp office_macro_on_action
Files
-
sparrow.zip.zip
Password: infected
-
AC-June-9137.mpp.mpp .doc windows office2003