Behavioral task
behavioral1
Sample
AC-June-1565.mpp
Resource
win7-20240508-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
AC-June-1565.mpp
Resource
win10v2004-20240508-en
3 signatures
150 seconds
General
-
Target
3afd98af714271b9ae6598fbfa63138f009a448b7c129a08a6069a130add4233.zip
-
Size
35KB
-
MD5
397639354c32e2bf1910ff01c67d6f34
-
SHA1
6756fffb093bdb3047b66b71ff9060eebc264f3f
-
SHA256
3afd98af714271b9ae6598fbfa63138f009a448b7c129a08a6069a130add4233
-
SHA512
4b1c0b35c4e83212edfcefdf4d742b0e65399b42f398b13f08a9a791b7399dacfeafb5deec3514beeb185410ffb74fb034efd08d0eb8784c170d5deb60e67fed
-
SSDEEP
768:FqP7BoWTLoytSjXoyz9Hdh/z1yZJKE0zPX4NksP7KCqryjf:FOloaoyt279HHBKJ10z/zsP7bYaf
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/AC-June-1565.mpp office_macro_on_action
Files
-
3afd98af714271b9ae6598fbfa63138f009a448b7c129a08a6069a130add4233.zip.zip
-
AC-June-1565.mpp.mpp .doc windows office2003