Behavioral task
behavioral1
Sample
f3a2b64e743f49f10dae14b027b7c710_JaffaCakes118.doc
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
f3a2b64e743f49f10dae14b027b7c710_JaffaCakes118.doc
Resource
win10v2004-20240412-en
4 signatures
150 seconds
General
-
Target
f3a2b64e743f49f10dae14b027b7c710_JaffaCakes118
-
Size
21KB
-
MD5
f3a2b64e743f49f10dae14b027b7c710
-
SHA1
1e2252a39ad1e052164cdcdf30af6e66400fb8ad
-
SHA256
190e515334924bfea93617150775be9644bef6425cf237d6eabe9abb16fa442e
-
SHA512
17873ae9e3a23b7f1909b1d34e741452e3ee8b4aabe3742e270d32fa7ede485790912ce1ad1cf604a33a62223d6dc3439be5d4714d94702060e72c7620bf6f54
-
SSDEEP
384:njR4+FwPElWgBYvtRYWmbvo2IJDhO5eW:nlA9p2jp2VO5z
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
f3a2b64e743f49f10dae14b027b7c710_JaffaCakes118.doc windows office2003
ThisWorkbook
Sheet1