Behavioral task
behavioral1
Sample
Macro test.vbs
Resource
win7-20240319-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
Macro test.vbs
Resource
win10v2004-20240226-en
0 signatures
150 seconds
General
-
Target
c99223b4bbaace53b0ab0d0b44621fa1_JaffaCakes118
-
Size
7KB
-
MD5
c99223b4bbaace53b0ab0d0b44621fa1
-
SHA1
e4a4bee77d39dae9ce4f9ad96dde63b4605e231e
-
SHA256
4ac93a85be004f0feb9429b5fdda53db870a81d5ca7fee0e6b0b42254028802c
-
SHA512
d821d82661891030c8acdac9863be6b78d9c9207c604fd3e32f0b5b9a525138422b6fa8a3a4690c83e48cfa9cc6559b0ab8ac74ff79fcf65f5a23bd48438bb61
-
SSDEEP
192:Hv9sorFYtAgW6nDuI8YCkdvVTSckiz5svg:HvpF6Ck6Yz5s4
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/Macro test.doc office_macro_on_action -
resource static1/unpack001/Macro test.doc
Files
-
c99223b4bbaace53b0ab0d0b44621fa1_JaffaCakes118.zip
-
Macro test.doc.doc .vbs windows office2003 polyglot
ThisDocument
NewMacros