Behavioral task
behavioral1
Sample
0632929ebd49f8e43f80035cf8d4d76a_JaffaCakes118.doc
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
0632929ebd49f8e43f80035cf8d4d76a_JaffaCakes118.doc
Resource
win10v2004-20240419-en
4 signatures
150 seconds
General
-
Target
0632929ebd49f8e43f80035cf8d4d76a_JaffaCakes118
-
Size
12KB
-
MD5
0632929ebd49f8e43f80035cf8d4d76a
-
SHA1
8ae67788e9d9ce8ad11549502517ba8cdaf99c73
-
SHA256
e9cde9649ac7ed776e1ded3742258d6d13695c377ade91d7b10f86ce3509426e
-
SHA512
9748baff6d6512125ac09e17a701c0bc69b8ea7365c0cd3887ae02def915e9aeeee31b35ab636b3c11adf5097c3571151fa6d1252f1b1e9b3b19e41a2db2b161
-
SSDEEP
192:XMc5NxyOsm91g47dCjMN5A0je1K6taqwUa2:XxyOt9C47dSUA0jgtU
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
0632929ebd49f8e43f80035cf8d4d76a_JaffaCakes118.doc .vbs windows office2003 polyglot
ThisDocument
NewMacros