Behavioral task
behavioral1
Sample
00539bd67c6d76554cf98b8a0534b29a_JaffaCakes118.doc
Resource
win7-20240221-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
00539bd67c6d76554cf98b8a0534b29a_JaffaCakes118.doc
Resource
win10v2004-20240412-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
00539bd67c6d76554cf98b8a0534b29a_JaffaCakes118
-
Size
90KB
-
MD5
00539bd67c6d76554cf98b8a0534b29a
-
SHA1
ea36a86e04efbcb8d7097b6cb7db6d849ea6c194
-
SHA256
a07d61afa7f207280178d99e18dd80999cb15636b4815d1115379ed57739ff30
-
SHA512
6fada542f3228ca31d7824cbc63d140d327db52671f51a781ab8a2923bb52c6a6191f3da60750cd964d1ae513f2dac1662690979e9eecead3ce185c1ff8f83e5
-
SSDEEP
1536:fptJlmrJpmxlRw99NBd+aBd1dfaJKI+j:xte2dw99fpja0I+j
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
00539bd67c6d76554cf98b8a0534b29a_JaffaCakes118.doc windows office2003
YXKjrzjwwzDo
NUADRhErKABjQ
WMWslEJoNi